Title :
Comparing performance of binary-coded detectors and constraint-based detectors
Author :
Hou, Haiyu ; Dozier, Gerry V.
Author_Institution :
Dept. of Comput. Sci. & Software Eng., Auburn Univ., AL, USA
Abstract :
Artificial immune systems can be used to detect intrusion by classifying network activities as normal or abnormal. High detection rates and low false positive rates are two necessary features of successful AIS. Strong detectors are the basis of creating a successful AIS. Some preliminary experiments showed its promise to encode detectors in the form of data triples. Currently, there are two types of detectors: binary-coded and constraint-based. This paper compares the two types of detectors using simulated network traffic data. The results show that constraint-based detectors perform better than binary-coded detectors.
Keywords :
authorisation; binary codes; computer networks; evolutionary computation; telecommunication security; telecommunication traffic; adaptive algorithms; artificial immune systems; binary-coded detectors; constraint-based detectors; evolutionary algorithm; intrusion detection; network classification; network traffic; Adaptive algorithm; Artificial immune systems; Computer science; Detectors; Immune system; Intrusion detection; Pattern matching; Software engineering; Telecommunication traffic; Traffic control;
Conference_Titel :
Evolutionary Computation, 2004. CEC2004. Congress on
Print_ISBN :
0-7803-8515-2
DOI :
10.1109/CEC.2004.1330937