DocumentCode :
384636
Title :
Artificial immunity using constraint-based detectors
Author :
Hou, Haiyu ; Zhu, Jun ; Dozier, Gerry
Author_Institution :
Dept. of Comput. Sci. & Software Eng., Auburn Univ., AL, USA
Volume :
13
fYear :
2002
fDate :
2002
Firstpage :
239
Lastpage :
244
Abstract :
In this paper, an artificial immune system (AIS) is used to detect abnormality in a computer network in an effort to provide protection from illegal intrusion and unauthorized use. The problem of anomaly detection can be addressed as the problem of distinguishing self patterns from non-self patterns. The self patterns could be any variety of characteristics of a system or its users. Detectors of an AIS recognize non-self patterns and invoke an alarm. In this work, an AIS was used to monitor simulated TCP/IP traffic on a simulated broadcast local area network. Detectors, in the form of interval constraints, were used to develop a simple and effective AIS.
Keywords :
authorisation; computer networks; computer viruses; TCP/IP traffic; abnormality detection; artificial immune system; computer network; constraint-based detector; illegal intrusion; interval constraints; nonself pattern; self pattern; Artificial immune systems; Computer networks; Detectors; Intrusion detection; Monitoring; Pattern recognition; Protection; TCPIP; Telecommunication traffic; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Automation Congress, 2002 Proceedings of the 5th Biannual World
Print_ISBN :
1-889335-18-5
Type :
conf
DOI :
10.1109/WAC.2002.1049551
Filename :
1049551
Link To Document :
بازگشت