DocumentCode :
3399737
Title :
Agent based Intrusion Detection System: A Computational Biology Approach
Author :
Janakiraman, S. ; Vasudevan, V. ; Radhakrishnan, S.
Author_Institution :
Dept. of Comput. Sci. & Eng., PSR Eng. Coll., Sivakasi
fYear :
2006
fDate :
Sept. 2006
Firstpage :
1
Lastpage :
4
Abstract :
This paper is focused on network and agent based intrusion detection systems. This paper includes an overview of several IDS implementations. Many approaches based on hidden Markov models and various forms of finite state automata have been proposed to solve problem of detecting anomaly intrusion, a security attack in which an intruder assumes the identity of a legitimate user. It is proposed to give a general framework for IDS based on the application of techniques used in bioinformatics and agent technology. Our approach is focused on the application of techniques used in bioinformatics for a pair-wise sequence alignment and multiple sequence alignment to compare the monitored session with past user behavior. To achieve low false positive rate in this framework the intrusion can be detected by means of comparing the signature of the current user´s session with already existing signatures of the potential intruder. The algorithms of computational biology such as approximation algorithm and Carillo-Lippman heuristic algorithm and sum-of-pairs scoring function are used to measure similarity between a sequence of commands produced by a potential intruder, the user signature and past intruder´s signatures. Finally in this research work computational bioinformatics techniques and agent technology are used to offer security in host and network to yield a promising combination of intrusion detection rate and false positive rate
Keywords :
biology computing; computer networks; digital signatures; finite state machines; hidden Markov models; software agents; Carillo-Lippman heuristic algorithm; IDS; agent based intrusion detection system; anomaly intrusion; approximation algorithm; computational bioinformatics; computational biology; finite state automata; hidden Markov models; host security; multiple sequence alignment; network security; pair-wise sequence alignment; sum-of-pairs scoring function; user signature; Approximation algorithms; Automata; Bioinformatics; Biology computing; Computational biology; Heuristic algorithms; Hidden Markov models; Intrusion detection; Monitoring; Sequences; Agents; Intrusion detection; anomaly intrusion; misuse intrusion;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
India Conference, 2006 Annual IEEE
Conference_Location :
New Delhi
Print_ISBN :
1-4244-0369-3
Electronic_ISBN :
1-4244-0370-7
Type :
conf
DOI :
10.1109/INDCON.2006.302764
Filename :
4086235
Link To Document :
بازگشت