Computational intelligence in intrusion detection systems

Size: px
Start display at page:

Download "Computational intelligence in intrusion detection systems"

Transcription

1 Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick TEIL

2 Reference The use of computational intelligence in intrusion detection systems : A review Shelly Xiaonan Wu, Wolfgang Banzhaf Applied Soft Computing 2009

3 Intrusion prevention techniques Intrusion detection systems (IDS) Fire walls Access control Encryption Data collection Data preprocessing Intrusion recognition Reporting Response

4 History of IDS 1987 early 1990s late 1990s D.E. Denning proposed an intrusion detection model Combinations of expert systems and statistical approaches Automated knowledge acquisition Combine with computational intelligence

5 Computational intelligence J.C. Bezdek (1994) : A system is computational intelligent when it: deals with only numerical (low-level) data, has pattern recognition components does not use knowledge in the artificial intelligence sense; and additionally when it (begins to) exhibit (i) computational adaptivity, (ii) computational fault tolerance, (iii) speed approaching human-like turnaround, and (iv) error rates that approximate human performance.

6 Computational intelligence Artificial neural networks Fuzzy sets Evolutionary computation methods Artificial immune systems Swarm intelligence Soft computing.

7 Roadmap Introduction to intrusion detection systems (IDS) Evolutionary computation methods Artificial immune systems Swarm intelligence Discussion

8 Intrusion detection system Solid lines : data/control flow Dashed lines : responses to intrusive activities.

9 Intrusion detection system IDS Misuse detection Anomaly detection Predefined descriptions of intrusive behaviors Supervised learning Fail easily when facing unknown intrusions Hypothesize that abnormal behavior is rare and different from normal behavior Unsupervised learning Difficulties: deficiency of abnormal samples, adaption to constantly changing normal behavior

10 Evolutionary computation

11 Evolutionary computation Genetic algorithms Automatic model structure design Classifiers Genetic programming Classifiers

12 Automatic model structure design Artificial neural networks need optimal structures. Clustering algorithms need the number of clusters. Use GA to search the right structure or parameters

13 Classifiers Classification rules Transformation functions GA: search the parameters GP: search the functions

14 Niching and fitness function Niching techniques are adopted. Fitness sharing, crowding, voting, token competition Fitness function Detection rate False positive rate Conciseness

15 Challenges No reasonable termination criterion Niching Distributed EC models Unbalanced data distribution

16 Artificial immune system

17 Human immune system Innate immune system Adaptive immune system

18 Innate immune system 1. Skin 2. Respiratory tract 3. Gastrointestinal tract 4. Urogenital tract ***CORPORATION 1. Phagocytosis 2. Inflammation 3. Complement 4. Interferon

19 Adaptive immune system 1. Skin 2. Respiratory tract 3. Gastrointestinal tract 4. Urogenital tract ***CORPORATION 1. Phagocytosis 2. Inflammation 3. Complement 4. Interferon

20 ***CORPORATION Adaptive immune system

21 T-cell helper IL-1 IL-2 killer supressor memory M T4 IL-6 Plasm cell B-cell Ig ***CORPORATION memory

22 Normally, lymphocytes do not attack normal cells, why? Lymphocytes must be mature before leaving red bone marrow.

23 Maturation To avoid autoimmunity, T cells and B cells must pass a negative selection stage, where lymphocytes which match self cells are killed. (These mature lymphocytes have never encountered antigens.)

24 Artificial immune system (AIS) Anomaly detection Instead of building models for the normal, they generate non-self (anomalous) patterns by giving normal data.

25 Negative selection

26 Self non-self discrimination model

27 Lifespan model

28 An evolutionary AIS model Three stages : gene library evolution negative selection clonal selection Immature detectors, rather than generated randomly, are created by selecting and rearranging useful genes. The library evolves. The clonal selection detects various intrusions with a limited number of detectors, generates memory detectors, and drives the gene library evolution.

29

30 Challenges Fitting to real-world environments Avoid the scaling problem Detect and fill holes Estimate the coverage of rule sets Deal with a high volume and dimensional data Adapting to changes in self data Integrating immune responses

31 Swarm intelligence

32 Ant colony optimization Use ACO to keep track of intruder trails Identify affected paths of intrusion in a sensor network by investigating the pheromone concentration Clustering local strategy rules

33 Particle swarm optimization Learn classification rules divide-and-conquer : Use PSO to find the best rule covering current training set Remove those covered points

34 Discussion

35 Performance

36 Research

37 Challenges Good benchmark datasets Old and unrealistic Ability of adaptation to constantly changing environments intrusive behavior legitimate behavior systems networks

38 Thanks

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Artificial Immune Systems and Applications for Computer Security

Artificial Immune Systems and Applications for Computer Security Università degli Studi di Milano Dipartimento di Tecnologie dell Informazione Artificial Immune Systems and Applications for Computer Security Antonia Azzini and Stefania Marrara Artificial Immune System

More information

The Human Immune System and Network Intrusion Detection

The Human Immune System and Network Intrusion Detection The Human Immune System and Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Projects - Neural and Evolutionary Computing

Projects - Neural and Evolutionary Computing Projects - Neural and Evolutionary Computing 2014-2015 I. Application oriented topics 1. Task scheduling in distributed systems. The aim is to assign a set of (independent or correlated) tasks to some

More information

Name (print) Name (signature) Period. (Total 30 points)

Name (print) Name (signature) Period. (Total 30 points) AP Biology Worksheet Chapter 43 The Immune System Lambdin April 4, 2011 Due Date: Thurs. April 7, 2011 You may use the following: Text Notes Power point Internet One other person in class "On my honor,

More information

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins

specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins Adaptive Immunity Chapter 17: Adaptive (specific) Immunity Bio 139 Dr. Amy Rogers Host defenses that are specific to a particular infectious agent Can be innate or genetic for humans as a group: most microbes

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

The Use of Computational Intelligence in Intrusion Detection Systems: A Review

The Use of Computational Intelligence in Intrusion Detection Systems: A Review Technical Report #2008-05 The Use of Computational Intelligence in Intrusion Detection Systems: A Review by Shelly Xiaonan Wu* Wolfgang Banzhaf Email: xiaonan@cs.mun.ca, banzhaf@cs.mun.ca Department of

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College

More information

The Immune System: A Tutorial

The Immune System: A Tutorial The Immune System: A Tutorial Modeling and Simulation of Biological Systems 21-366B Shlomo Ta asan Images taken from http://rex.nci.nih.gov/behindthenews/uis/uisframe.htm http://copewithcytokines.de/ The

More information

Chapter 43: The Immune System

Chapter 43: The Immune System Name Period Our students consider this chapter to be a particularly challenging and important one. Expect to work your way slowly through the first three concepts. Take particular care with Concepts 43.2

More information

Shafzon@yahool.com. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam

Shafzon@yahool.com. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State Idris.ismaila95@gmail.com Abdulhamid Shafi i

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Microbiology AN INTRODUCTION EIGHTH EDITION

Microbiology AN INTRODUCTION EIGHTH EDITION TORTORA FUNKE CASE Microbiology AN INTRODUCTION EIGHTH EDITION Differentiate between innate and acquired immunity. Chapter 17 Specific Defenses of the Host: The Immune Response B.E Pruitt & Jane J. Stein

More information

Practical Applications of Evolutionary Computation to Financial Engineering

Practical Applications of Evolutionary Computation to Financial Engineering Hitoshi Iba and Claus C. Aranha Practical Applications of Evolutionary Computation to Financial Engineering Robust Techniques for Forecasting, Trading and Hedging 4Q Springer Contents 1 Introduction to

More information

An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors

An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors Int. Journ. of Unconventional Computing, Vol. 1, pp. 221 254 Reprints available directly from the publisher Photocopying permitted by license only 2005 Old City Publishing, Inc. Published by license under

More information

One of the more complex systems we re looking at. An immune response (a response to a pathogen) can be of two types:

One of the more complex systems we re looking at. An immune response (a response to a pathogen) can be of two types: Immune system. One of the more complex systems we re looking at. An immune response (a response to a pathogen) can be of two types: (pathogen - disease causing organism) 1) Non specific. Anything foreign

More information

Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India

Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone

More information

ENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model

ENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model Research Journal of Applied Sciences, Engineering and Technology 5(21): 4988-4993, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September

More information

Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.

Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.

More information

Intrusion Detection for Grid and Cloud Computing

Intrusion Detection for Grid and Cloud Computing Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

Immunity. Humans have three types of immunity innate, adaptive, and passive: Innate Immunity

Immunity. Humans have three types of immunity innate, adaptive, and passive: Innate Immunity Immunity Humans have three types of immunity innate, adaptive, and passive: Innate Immunity Everyone is born with innate (or natural) immunity, a type of general protection. Many of the germs that affect

More information

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 597 602

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 597 602 Proceedings of the Federated Conference on Computer Science and Information Systems pp. 597 602 ISBN 978-83-60810-51-4 Detectors Generation using Genetic Algorithm for a Negative Selection Inspired Anomaly

More information

Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection

Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi

More information

Bio 20 Chapter 11 Workbook Blood and the Immune System Ms. Nyboer

Bio 20 Chapter 11 Workbook Blood and the Immune System Ms. Nyboer Bio 20 Chapter 11 Workbook Blood and the Immune System Ms. Nyboer Name: Part A: Components of Blood 1. List the 3 plasma proteins and describe the function of each Albumins osmotic balance Globulins antibodies,

More information

The Immune System. 2 Types of Defense Mechanisms. Lines of Defense. Line of Defense. Lines of Defense

The Immune System. 2 Types of Defense Mechanisms. Lines of Defense. Line of Defense. Lines of Defense The Immune System 2 Types of Defense Mechanisms Immune System the system that fights infection by producing cells to inactivate foreign substances to avoid infection and disease. Immunity the body s ability

More information

USING GENETIC ALGORITHM IN NETWORK SECURITY

USING GENETIC ALGORITHM IN NETWORK SECURITY USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Procedia Computer Science

Procedia Computer Science Procedia Computer Science 00 (2011) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia WCIT-2011 Host Based Anomaly Detection Using a Combination of Artificial Immune Systems and Hypervisor

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?

MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY? MACHINE LEARNING & INTRUSION DETECTION: 1 SUMMARY The potential use of machine learning techniques for intrusion detection is widely discussed amongst security experts. At Kudelski Security, we looked

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

The Body s Defenses CHAPTER 24

The Body s Defenses CHAPTER 24 CHAPTER 24 The Body s Defenses PowerPoint Lectures for Essential Biology, Third Edition Neil Campbell, Jane Reece, and Eric Simon Essential Biology with Physiology, Second Edition Neil Campbell, Jane Reece,

More information

Adaptive Anomaly Detection for Network Security

Adaptive Anomaly Detection for Network Security International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection

A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,

More information

Call for Paper Journal of Medical Imaging and Health Informatics Special issue on

Call for Paper Journal of Medical Imaging and Health Informatics Special issue on Call for Paper Journal of Medical Imaging and Health Informatics Special issue on Application of Wireless communication for Medical Imaging and Health Informatics The applications of wireless communication

More information

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of

More information

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

An ACO Approach to Solve a Variant of TSP

An ACO Approach to Solve a Variant of TSP An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents

More information

Honey Bee Intelligent Model for Network Zero Day Attack Detection

Honey Bee Intelligent Model for Network Zero Day Attack Detection Honey Bee Intelligent Model for Network Zero Day Attack Detection 1 AMAN JANTAN, 2 ABDULGHANI ALI AHMED School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia 1 aman@cs.usm.my,

More information

The Multi-Agents Immune System for Network Intrusions Detection (MAISID)

The Multi-Agents Immune System for Network Intrusions Detection (MAISID) ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

The Human Immune System

The Human Immune System The Human Immune System What is the immune system? The body s defense against disease causing organisms, malfunctioning cells, and foreign particles The First Line of Defense Skin The dead, outer layer

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

Selective IgA deficiency (slgad) hello@piduk.org 0800 987 8986 www.piduk.org

Selective IgA deficiency (slgad) hello@piduk.org 0800 987 8986 www.piduk.org Selective IgA deficiency (slgad) hello@piduk.org 0800 987 8986 www.piduk.org About this booklet This booklet provides information on selective IgA deficiency (sigad). It has been produced by the PID UK

More information

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity

More information

An Efficient Three-phase Email Spam Filtering Technique

An Efficient Three-phase Email Spam Filtering Technique An Efficient Three-phase Email Filtering Technique Tarek M. Mahmoud 1 *, Alaa Ismail El-Nashar 2 *, Tarek Abd-El-Hafeez 3 *, Marwa Khairy 4 * 1, 2, 3 Faculty of science, Computer Sci. Dept., Minia University,

More information

Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory

Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion

More information

ANIMALS FORM & FUNCTION BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES. Animals Form & Function Activity #4 page 1

ANIMALS FORM & FUNCTION BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES. Animals Form & Function Activity #4 page 1 AP BIOLOGY ANIMALS FORM & FUNCTION ACTIVITY #4 NAME DATE HOUR BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES Animals Form & Function Activity #4 page 1 INFLAMMATORY RESPONSE ANTIMICROBIAL

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges Bridges@cs.msstate.edu Rayford B. Vaughn vaughn@cs.msstate.edu 23 rd National Information Systems Security Conference

More information

1) Siderophores are bacterial proteins that compete with animal A) Antibodies. B) Red blood cells. C) Transferrin. D) White blood cells. E) Receptors.

1) Siderophores are bacterial proteins that compete with animal A) Antibodies. B) Red blood cells. C) Transferrin. D) White blood cells. E) Receptors. Prof. Lester s BIOL 210 Practice Exam 4 (There is no answer key. Please do not email or ask me for answers.) Chapters 15, 16, 17, 19, HIV/AIDS, TB, Quorum Sensing 1) Siderophores are bacterial proteins

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing

Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing Azuan Ahmad, Bharanidharan Shanmugam, Norbik Bashah Idris, Ganthan Nayarana Samy, and Sameer Hasan AlBakri Abstract Cloud Computing

More information

Basics of Immunology

Basics of Immunology Basics of Immunology 2 Basics of Immunology What is the immune system? Biological mechanism for identifying and destroying pathogens within a larger organism. Pathogens: agents that cause disease Bacteria,

More information

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security

More information

A Neural Network Based System for Intrusion Detection and Classification of Attacks

A Neural Network Based System for Intrusion Detection and Classification of Attacks A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,

More information

Research Article www.ijptonline.com EFFICIENT TECHNIQUES TO DEAL WITH BIG DATA CLASSIFICATION PROBLEMS G.Somasekhar 1 *, Dr. K.

Research Article www.ijptonline.com EFFICIENT TECHNIQUES TO DEAL WITH BIG DATA CLASSIFICATION PROBLEMS G.Somasekhar 1 *, Dr. K. ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFICIENT TECHNIQUES TO DEAL WITH BIG DATA CLASSIFICATION PROBLEMS G.Somasekhar 1 *, Dr. K.Karthikeyan 2 1 Research

More information

10. T and B cells are types of a. endocrine cells. c. lymphocytes. b. platelets. d. complement cells.

10. T and B cells are types of a. endocrine cells. c. lymphocytes. b. platelets. d. complement cells. Virus and Immune System Review Directions: Write your answers on a separate piece of paper. 1. Why does a cut in the skin threaten the body s nonspecific defenses against disease? a. If a cut bleeds, disease-fighting

More information

DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES

DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 lakshmi.mahanra@gmail.com

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Intrusion Detection Systems using Genetic Algorithms

Intrusion Detection Systems using Genetic Algorithms King Saud University Computer Science Collage CSC590_Selected Topic A Literature Review on Intrusion Detection Systems using Genetic Algorithms Phase # 5 By: Lamees Alhazzaa ID: 426221091 Proposed to:

More information

Identifying Online Credit Card Fraud using Artificial Immune Systems

Identifying Online Credit Card Fraud using Artificial Immune Systems Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Identifying online credit card fraud using

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

Increasing the Accuracy of a Spam-Detecting Artificial Immune System

Increasing the Accuracy of a Spam-Detecting Artificial Immune System Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University terri@zone12.com Tony White Carleton University arpwhite@scs.carleton.ca Abstract- Spam, the electronic

More information

Immunity Unit Test Z

Immunity Unit Test Z Immunity Unit Test Z Name MB Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the pathogens in Figure 31.1 cause disease by taking over healthy

More information

Lymph capillaries, Lymphatic collecting vessels, Valves, Lymph Duct, Lymph node, Vein

Lymph capillaries, Lymphatic collecting vessels, Valves, Lymph Duct, Lymph node, Vein WLHS/A&P/Oppelt Name Lymphatic System Practice 1. Figure 12-1 provides an overview of the lymphatic vessels. First color code the following structures. Color code in Figure 12-1 Heart Veins Lymphatic vessels/lymph

More information

System Specification. Author: CMU Team

System Specification. Author: CMU Team System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect

More information

AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION

AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION Noria Benyettou 1, Abdelkader Benyettou 2 and Vincent Rodin 3 1 University of Science and Technology of Oran Mohamed Boudiaf USTOMB, SIMPA Laboratory,

More information

Data Mining Application for Cyber Credit-card Fraud Detection System

Data Mining Application for Cyber Credit-card Fraud Detection System , July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved

More information

Performance Evaluation of Intrusion Detection Systems using ANN

Performance Evaluation of Intrusion Detection Systems using ANN Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

The Immune System. How your immune system works. Organs of the Immune System

The Immune System. How your immune system works. Organs of the Immune System UW MEDICINE PATIENT EDUCATION The Immune System How your immune system works The immune system is a network of special cells, tissues, and organs that defend the body against attacks from foreign invaders,

More information

Asthma (With a little SCID to start) Disclosures Outline Starting with the Immune System The Innate Immune System The Adaptive Immune System

Asthma (With a little SCID to start) Disclosures Outline Starting with the Immune System The Innate Immune System The Adaptive Immune System 1 2 3 4 5 6 7 8 9 Asthma (With a little SCID to start) Lauren Smith, MD CHKD Pediatric Allergy/Immunology Disclosures None Will be discussing some medications that are not yet FDA approved Outline SCID

More information

MagicNET: The Human Immune System and Network Security System

MagicNET: The Human Immune System and Network Security System IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 87 MagicNET: The Human Immune System and Network Security System Muhammad Awais Shibli,, Jeffy Mwakalinga,

More information

Extraction of Satellite Image using Particle Swarm Optimization

Extraction of Satellite Image using Particle Swarm Optimization Extraction of Satellite Image using Particle Swarm Optimization Er.Harish Kundra Assistant Professor & Head Rayat Institute of Engineering & IT, Railmajra, Punjab,India. Dr. V.K.Panchal Director, DTRL,DRDO,

More information

Artificial Intelligence (AI)

Artificial Intelligence (AI) Overview Artificial Intelligence (AI) A brief introduction to the field. Won t go too heavily into the theory. Will focus on case studies of the application of AI to business. AI and robotics are closely

More information

Feature Subset Selection in E-mail Spam Detection

Feature Subset Selection in E-mail Spam Detection Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Introduction. Swarm Intelligence - Thiemo Krink EVALife Group, Dept. of Computer Science, University of Aarhus

Introduction. Swarm Intelligence - Thiemo Krink EVALife Group, Dept. of Computer Science, University of Aarhus Swarm Intelligence - Thiemo Krink EVALife Group, Dept. of Computer Science, University of Aarhus Why do we need new computing techniques? The computer revolution changed human societies: communication

More information

Using Genetic Algorithm for Network Intrusion Detection

Using Genetic Algorithm for Network Intrusion Detection Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: wli@cse.msstate.edu Abstract

More information

Ant Colony Optimization and Constraint Programming

Ant Colony Optimization and Constraint Programming Ant Colony Optimization and Constraint Programming Christine Solnon Series Editor Narendra Jussien WILEY Table of Contents Foreword Acknowledgements xi xiii Chapter 1. Introduction 1 1.1. Overview of the

More information

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)

More information

DEVELOPMENT OF A COMPUTATIONAL INTELLIGENCE COURSE FOR UNDERGRADUATE AND GRADUATE STUDENTS

DEVELOPMENT OF A COMPUTATIONAL INTELLIGENCE COURSE FOR UNDERGRADUATE AND GRADUATE STUDENTS DEELOPMENT OF A COMPUTATIONAL INTELLIGENCE COURSE FOR UNDERGRADUATE AND GRADUATE STUDENTS Ganesh K. enayagamoorthy Department of Electrical and Computer Engineering University of Missouri Rolla, MO 65409,

More information

Neural Networks for Intrusion Detection and Its Applications

Neural Networks for Intrusion Detection and Its Applications , July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security

More information

Activation and effector functions of HMI

Activation and effector functions of HMI Activation and effector functions of HMI Hathairat Thananchai, DPhil Department of Microbiology Faculty of Medicine Chiang Mai University 25 August 2015 ว ตถ ประสงค หล งจากช วโมงบรรยายน แล วน กศ กษาสามารถ

More information

Machine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer

Machine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer Machine Learning Chapter 18, 21 Some material adopted from notes by Chuck Dyer What is learning? Learning denotes changes in a system that... enable a system to do the same task more efficiently the next

More information

Machine Learning: Overview

Machine Learning: Overview Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Core Topic 2. The immune system and how vaccines work

Core Topic 2. The immune system and how vaccines work Core Topic 2 The immune system and how vaccines work Learning outcome To be able to describe in outline the immune system and how vaccines work in individuals and populations Learning objectives Explain

More information

Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector

Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector Jungwon Kim, Arlene Ong and Richard E Overill Department of Computer Science, King s

More information

Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science

Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science International Journal of Knowledge www.ijklp.org and Language Processing AKLP International c2011 ISSN 2191-2734 Volume 2, Number 2, April 2011 pp. 23-34 Research on Network Security Situation Awareness

More information