Title :
Artificial immunity using constraint-based detectors
Author :
Hou, Haiyu ; Zhu, Jun ; Dozier, Gerry
Author_Institution :
Dept. of Comput. Sci. & Software Eng., Auburn Univ., AL, USA
Abstract :
In this paper, an artificial immune system (AIS) is used to detect abnormality in a computer network in an effort to provide protection from illegal intrusion and unauthorized use. The problem of anomaly detection can be addressed as the problem of distinguishing self patterns from non-self patterns. The self patterns could be any variety of characteristics of a system or its users. Detectors of an AIS recognize non-self patterns and invoke an alarm. In this work, an AIS was used to monitor simulated TCP/IP traffic on a simulated broadcast local area network. Detectors, in the form of interval constraints, were used to develop a simple and effective AIS.
Keywords :
authorisation; computer networks; computer viruses; TCP/IP traffic; abnormality detection; artificial immune system; computer network; constraint-based detector; illegal intrusion; interval constraints; nonself pattern; self pattern; Artificial immune systems; Computer networks; Detectors; Intrusion detection; Monitoring; Pattern recognition; Protection; TCPIP; Telecommunication traffic; Traffic control;
Conference_Titel :
Automation Congress, 2002 Proceedings of the 5th Biannual World
Print_ISBN :
1-889335-18-5
DOI :
10.1109/WAC.2002.1049551