Artificial Immune Systems and Applications for Computer Security
|
|
|
- Stanley Morton
- 10 years ago
- Views:
Transcription
1 Università degli Studi di Milano Dipartimento di Tecnologie dell Informazione Artificial Immune Systems and Applications for Computer Security Antonia Azzini and Stefania Marrara Artificial Immune System (AIS) Computational systems inspired by theoretical immunology. Development and application domains follow the soft computing paradigms of Artificial Neural Networks (ANNs), Evolutionary Algorithms (EAs) and Fuzzy Systems (FS). Applied in a wide variety of areas: - Pattern recognition and classification (Carter , Timmis 2002, ) - Optimization (Fukuda 1998, De Castro 2000, ) - Data analysis (Timmis 2001, Von Zuben 2000, ) -Computer Security (Bentley 1999, Forrest 2000, ) - 1
2 Immune System Purpose: protect the body from the threats posed by pathogens minimize harm to the body and ensures its continued functioning. Aspects that the IS faces: identification or detection of pathogens (self/nonself), efficient elimination of those pathogens Efficient recognition of self antigens, molecules of the own body. Innate vs Adaptative Innate Immune System From birth Not specialized Adaptative Immune system Specific response to pathogenes The adaptive immune system also provides memory capabilities to the immune system. 2
3 Cell Representation IS: Basic Concepts Cells and molecules interact to detect and eliminate infectious agents (pathogens). Surfaces of immune system cells are covered with receptors, some chemically bind to pathogens and some bind to other immune system cells or molecules to enable the complex system of signaling that mediates the immune response. IS cells circulate around the body (blood and lymphsystems) forming a dynamic system of distributed detection and response. No centralized control and little, if any, hierarchical organization. IS is robust to failure of individual components and attacks on the IS itself. Problem of detecting pathogens is for self and nonself (elements of the body, and pathogens). 3
4 Pattern Recognition Recognition in the immune system is based on shape complementarity. Basically occurs at molecular level. Shapes of B and T cell surfaces have to be matched by the shapes of Antigens. Major Histocompatibility complex (MHC): antigens presented by molecules expressed in complex mode. Gene Expression Process Antibody Generation: the gene segments of different gene libraries are randomly selected and concatenated in a random order. 4
5 Immune Network Theory The hypotesis is that the immune system mantains an idiotypic network of interconnected B cells for antigen recognition. These cells both stimulate and suppress each other in certain ways that lead to the stabilization of the network. Two B cells are connected if the affinities they share exceed a certain threshold The strenght of the connection is directly proportional to the affinity they share. Clonal Selection The whole process of: Antigen recognition Cell proliferation (mitosis) Differentiation into memory cells Affinity Maturation: - Degree of binding of the cell receptor with the antigen. - Inversely proportional with mutation: the higher the affinity a cell receptor has with an antigen, the lower the mutation rate and vice-versa. - Directly proportional with proliferation: the higher the affinity the higher the number of offspring generated and vice-versa. 5
6 Negative Selection Works by learning the set of self strings in a training phase and classifying new data as normal or anomalous during a test phase. It consists of multiple negative detectors are analogous to limphocytes in the immune system. Detection is modeled as partial matching between s and the string representing d. Negative detectors match non-self strings, and not self strings. Negative Selection Algorithm (1) Distributed, by placing different detectors on different computers. Different randomly-generated detectors on different computers confer diversity, because different computers will be able to detect different intrusions. Robust: the loss of some detectors on a single computer will not result in a complete absence of protection. If the self set is representative of empirical normal behaviour, then policy is implicitly specified. Flexible: protection and computational requirements depend on the number of detectors, the number of detectors can be automatically increased. Localized detection no communication is required, the system is scalable (anomaly and signature-based detection). 6
7 Negative Selection Algorithm (2) In training phase: candidate detectors are randomly generated and compared to all self strings. If a candidate detector matches any self strings it is deleted and replaced by a new random detector. The process is repeated. Positive Selection The T cell receptor (TCR) is similar to that of the B cell,except that it is not secreted as antibody and does not bind directly to antigens. Rather it binds to peptides (small fragments of protein broken down from the pathogen) presented in a complex with a specialised self molecule called the Major Histocompatibility Complex (MHC). MHC is a specialised complex involved in regulating the T cell response in the immune system 7
8 Positive Selection The widely held view of the reason behind this difference between the MHC of individuals is that this ensures the immune systems of all individuals do not react in the same way to pathogens. Positive selection is an area in immunology where there are contrasting views. This arises around the ability of positive and negative selection to work together to both retain cells that recognise the self-mhc:peptide complex, while also removing cells that recognise any self peptides Artificial Immune Systems Representation: to create abstract models of immune organs, cells and molecules Affinity Measures: to quantify the interactions of these elements Immune Algorithms: govern the dynamics of the AIS 8
9 Principles of AIS Robustness: consequence of the fact that IS is diverse, distributed, dynamic and error tolerant. Adaptability: can learn to recognize and respond to new infections and retain a memory of them. Autonomy: no outside control required. Anomaly detection: ability to detect novel pathogens to which it has not been previously exposed. Diversity, generality: unique IS for each individual in a population Distributed protection: millions of distributed components that interact locally to provide protection. Detection System Detection Event: when the number of receptors bound exceeds some threshold, the lymphocyte is activated. A detection event occurs in the IS when chemical bonds are established between receptors on the surface of an immune cell, and epitopes, which are locations on the surface of a pathogen or protein fragment (a peptide). A lymphocyte will only be activated by pathogens if its receptors have sufficiently high affinities for particular epitope structures on the pathogens, and if the pathogens exist in sufficient numbers in the locality of the lymphocyte. 9
10 Immunology for Computer Scientist Recognition: chemical bonds established between specific receptors and epitopes. Receptor Diversity, to ensure that at least some lymphocytes can bind to any given pathogens, dynamic protection, with a continual turnover of lyimphocytes. Adaptation: B-cells, learn foreign proteins and remember them (memory of IS) for speeding up future responses. Affinity maturation enables B-cells to adapt to specific pathogens. Tolerance: responsability of another class of lymphocytes, Thcells, measure of auto-immune response to a self-attack from the IS. Learning and Memory: critical aspects Problem: limited lifetime of B-cells Some Solutions in the literature: Adapted B-cells (memory cells) live up to the lifetime of the organisms [MacKay, 1993]. B-cells constantly restimulated [Gray, 1992]. Consequences: Primary response Secondary response 10
11 Primary and Secondary Responses Computer Security Computer security system should protect computers from intrusions. Aspects to computer security: Confidentiality, authorized access to confidential data. Integrity, data protected from maliciuous or accidental corruption. Availability of data to the authorized users. Accountability, sufficient information for perpatrators identification. Correctness, minimization of fals alarms from incorrect classification. 11
12 Computer Security (2) Important issue: ability to determine difference between normal-harmful activity. Anomalies examples: Network Intrusion: attacks on a system coming through the network with computer communications via standard protocols. Traffic volume anomalies: generated from: DoS attacks (intentionally created by attackers) flash crowds (unintentionally caused by a larger numer of normal users) Consequences: dramatic increase in servers load, packet loss and congestion, degrading network operation, impacting QoS of the user. Solution -> timely detect intrusions from the onset. Network traffic anomalies: Anomaly Detection Relies on building models from network data. Discovers variations form the model in the observed data. Problem of: density level detection. Aggregation in time and in space (short and long scales). Different levels of protocol stack: IP packet level, transport level, application level. Traffic volume anomaly examples: Network operation anomaly Flash crowd anomaly Network abuse anomaly 12
13 Network Intrusion Detection (1) In monitoring network traffic all attacks on a system must come through the network. Computers communicate via standard protocols Protocols monitor allows the ID system to be independent from the local operating system. Attacks can be divided into: Host-targeted attacks: exploit holes in programs running as servers Network-targeted attacks: exploit weaknesses in network protocols. Systems fail to achieve: adaptability - flexibility Network Intrusion Detection (2) The Three-way TCP Handshake for a reliable communication. 13
14 Anomaly Detection System General Architecture of anomaly detection system. AIS approaches for network security presented in the literature 14
15 ARTIS for LISYS: Immuno-Inspired Inspired Distributed Detection System Forrest et al. Architecture of AIS Base representation of a TCP/IP SYN packet. Matching Rule: r-contiguous bits 15
16 Holes and Multiple Representations Holes: derived from patterns in the nonself set that cannot be covered by valid negative detectors of a given specificity. different representation for each local detection system. Extensions of Basic Model (1) GOALS Elimination of Autoreactive Detectors Adaptation to changing self-sets Signature-based detection MECHANISM Costimulation Distributed Tolerization Dynamic Detectors Memory Detectors 16
17 Extensions of Basic Model (2) Costimulation in the eliminating autoreactive lymphocytes. Distributed tolerization Each detector is created with a randomly-generated bit string (analogous to a receptor) and remains immature for a time period T called the tolerization period. Dynamic Detectors Each detector has a probability pdeath of dying once it has matured. When it dies, it is replaced by a new randomly-generated, immature detector. Memory Detectors The IS remembers the structures of known pathogens to facilitate future responses. Architecture of LISYS and results 17
18 Immune Technique to Detect Anomalies in Network Traffic (Gonzalez, Dasgupta 2002) AIS technique extending two-class into a multiple class approach. Non-self space is further classified in multiple sub-classes to determine the abnormality level. Genetic algorithm for rules evolution to cover the abnormal space. Detectors are represented by hypercubes that satisfy rules. Satisfactory rule: not include positive samples and cover a large area. The Proposed Approach (a) Self and non-self division of the Descriptor space. (b) Approximation of the non-self space by interval rules. Set of normal samples represented as points in a 2D space. (a) Rectangular rules cover the nonself space using a small value of v. (b) Rectangular rules cover the nonself space using a large value of v. (c) Level of deviation defined by each v, where level 1 corresponds to Non-self cover in (a) and level 2 Corresponds to non-self cover in (b). 18
19 Anomaly detection in TCP/IP networks (Bouvry et al. 2007) Use only TCP SYN packets as representatives of TCP communication. Antibodies and antigens represented by binary arrays correspondig to headers of packets. Euclidean or Hamming distances measure similarities between antibodies and antigens. Antibodies generation with: Positive characterization: legal traffic is used to create detectors Random characterization: detectors are randomly created Negative characterization: detectors are generated with antibodies not belonging to the legal traffic. Results The cost of running the system highly depends on a method of generation of antibodies. Positive characterization is the faster, weakest for time of detection: it is much larger than Negative. Random characterization requires more computational costs, but best for detection time: it provides the smallest number of detectors. Negative characterization is the most expensive. The choice of method for detector generation is matter of compromise between requested speed and available memory. 19
20 Negative Selection and Niching by AIS for Network ID (Bentley( et al. 1999) Problems to solve: new antibodies randomly generated are inefficient to detect antigens. Excessive computational time caused by randomgeneration approach Niching of the IS: evolution of antibodies towards the existing antigen patterns to exclude ineffectual detectors. Modified Negative Selection: algorithm with niching that replaces the random generation of pre-detectors with their evolution towards non-self. Modified Negative Selection Algorithm FIRST PHASE: the modified negative selection algorithm builds self profiles, that are encoded in an appropriate data representation. SECOND PHASE: For each self profile and its corresponding detector set: D detector patterns are randomly generated with fitness =0 N detector patterns are randomly selected from D detectors A single self pattern is randomly selected from the self profile Update fitness value of detectors Select fittest P_b% detectors as parents and apply genetic operators (crossover, mutation) to generate new detectors Delete the worst P_w% detectors Create new detector population by including the selected parents and the offspring generated. THIRD PHASE: detector patterns in each detector set are compared to the pattern in each corresponding new self profile. Alarm signal is generated if they are similar beyond a predefined threshold. 20
21 Data Profiling TCP packets are considered for anomaly detection For each TCP connection are extracted: Connection identifier: initiator address, initiator port, receiver address, receiver port Known port vulnerabilities 3way Handshaking Traffic intensity Detector Phenotype = (Number of Packet =[10,26], Duration =[0.3,0.85], Termination = half closed, etc) Self Phenotype = (Number of Packet = 35, Duration = 0.37, Termination = normal, etc) AIS for NIDS (Gabrielli( et al. 2006) Affinity between a lymphocyte and a traffic substring is substituted by a binary match between the two strings with true if the two strings are equal or false otherwise. Random generation is implemented as a batch procedure executed to replace dead lymphocytes in order to have the same number of active lymphocytes as at the end of the training phase. For each lymphocyte four possible states of life are considered Idle Active Alerted Memory cell Co-stimulation: the flow back from the HTTP system is used to the client to represent the confirmation signal. 21
22 Lymphocyte state model Conclusions and Future Work AIS constitute a successfull computational intelligence paradigm inspired by IS to solve problems in different domain areas. Evolutionary algorithm and artificial neural networks to improve pattern classification and network security. The choice of method for detector generation is matter of compromise between requested speed and available memory. Current research is directed to find more effective methods of generating detectors (Promising alternative for searching rule detectors is applying coevolutionary algorithms). real-time self-adaptiveness 22
23 In the Literature J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross (2007). Immune system approaches to intrusion detection - a review. Natural Computing. V. Cutello, G. Nicosia, M. Pavone, J. Timmis (2007) An Immune Algorithm for Protein Structure Prediction on Lattice Models, IEEE Transactions on Evolutionary Computation. F. Esponda, H. Jia, S. Forrest, and P. Helman (2006), "Protecting Data Privacy through Hard-to-Reverse Negative Databases," Proceedings of the Information Security Conference S. Garrett (2005) How Do We Evaluate Artificial Immune Systems? Evolutionary Computation. F. Gonzalez (2003). A study of artificial immune systems applied to anomaly detection. Technical report. H. Inoue and S. Forrest (2002) Anomaly Intrusion Detection in Dynamic Execution Environments., New Security Paradigms Workshops. L. DeCastro and J. Timmis (2001) Artificial Immune Systems: A New Computational Intelligence Approach 23
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins
Adaptive Immunity Chapter 17: Adaptive (specific) Immunity Bio 139 Dr. Amy Rogers Host defenses that are specific to a particular infectious agent Can be innate or genetic for humans as a group: most microbes
A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM
A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
[email protected]. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam
An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State [email protected] Abdulhamid Shafi i
The Body s Defenses CHAPTER 24
CHAPTER 24 The Body s Defenses PowerPoint Lectures for Essential Biology, Third Edition Neil Campbell, Jane Reece, and Eric Simon Essential Biology with Physiology, Second Edition Neil Campbell, Jane Reece,
2) Macrophages function to engulf and present antigen to other immune cells.
Immunology The immune system has specificity and memory. It specifically recognizes different antigens and has memory for these same antigens the next time they are encountered. The Cellular Components
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
A Review on Intrusion Detection System based on Artificial Immune System
A Review on Intrusion Detection System based on Artificial Immune System Pavitra Chauhan Nikita Singh Nidhi Chandra ABSTRACT Various approaches from different fields have been proposed to improve the security
Bio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany [email protected]
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Name (print) Name (signature) Period. (Total 30 points)
AP Biology Worksheet Chapter 43 The Immune System Lambdin April 4, 2011 Due Date: Thurs. April 7, 2011 You may use the following: Text Notes Power point Internet One other person in class "On my honor,
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
Basics of Immunology
Basics of Immunology 2 Basics of Immunology What is the immune system? Biological mechanism for identifying and destroying pathogens within a larger organism. Pathogens: agents that cause disease Bacteria,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Chapter 43: The Immune System
Name Period Our students consider this chapter to be a particularly challenging and important one. Expect to work your way slowly through the first three concepts. Take particular care with Concepts 43.2
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Increasing the Accuracy of a Spam-Detecting Artificial Immune System
Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University [email protected] Tony White Carleton University [email protected] Abstract- Spam, the electronic
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science
International Journal of Knowledge www.ijklp.org and Language Processing AKLP International c2011 ISSN 2191-2734 Volume 2, Number 2, April 2011 pp. 23-34 Research on Network Security Situation Awareness
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Hapten - a small molecule that is antigenic but not (by itself) immunogenic.
Chapter 3. Antigens Terminology: Antigen: Substances that can be recognized by the surface antibody (B cells) or by the TCR (T cells) when associated with MHC molecules Immunogenicity VS Antigenicity:
How To Design An Intrusion Prevention System
INTRUSION PREVENTION SYSTEMS (IPS): NEXT GENERATION FIREWALLS A Spire Research Report March 2004 By Pete Lindstrom, Research Director SP i RE security Spire Security, LLC P.O. Box 152 Malvern, PA 19355
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
The Multi-Agents Immune System for Network Intrusions Detection (MAISID)
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
An Efficient Three-phase Email Spam Filtering Technique
An Efficient Three-phase Email Filtering Technique Tarek M. Mahmoud 1 *, Alaa Ismail El-Nashar 2 *, Tarek Abd-El-Hafeez 3 *, Marwa Khairy 4 * 1, 2, 3 Faculty of science, Computer Sci. Dept., Minia University,
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Figure 14.2 Overview of Innate and Adaptive Immunity
I M M U N I T Y Innate (inborn) Immunity does not distinguish one pathogen from another Figure 14.2 Overview of Innate and Adaptive Immunity Our first line of defense includes physical and chemical barriers
The Human Immune System
The Human Immune System What is the immune system? The body s defense against disease causing organisms, malfunctioning cells, and foreign particles The First Line of Defense Skin The dead, outer layer
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
ANIMALS FORM & FUNCTION BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES. Animals Form & Function Activity #4 page 1
AP BIOLOGY ANIMALS FORM & FUNCTION ACTIVITY #4 NAME DATE HOUR BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES Animals Form & Function Activity #4 page 1 INFLAMMATORY RESPONSE ANTIMICROBIAL
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
LESSON 3: ANTIBODIES/BCR/B-CELL RESPONSES
Introduction to immunology. LESSON 3: ANTIBODIES/BCR/B-CELL RESPONSES Today we will get to know: The antibodies How antibodies are produced, their classes and their maturation processes Antigen recognition
Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
B Cell Generation, Activation & Differentiation. B cell maturation
B Cell Generation, Activation & Differentiation Naïve B cells- have not encountered Ag. Have IgM and IgD on cell surface : have same binding VDJ regions but different constant region leaves bone marrow
T Cell Maturation,Activation and Differentiation
T Cell Maturation,Activation and Differentiation Positive Selection- In thymus, permits survival of only those T cells whose TCRs recognize self- MHC molecules (self-mhc restriction) Negative Selection-
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
An Application of Machine Learning to Network Intrusion Detection
An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu
Chapter 18: Applications of Immunology
Chapter 18: Applications of Immunology 1. Vaccinations 2. Monoclonal vs Polyclonal Ab 3. Diagnostic Immunology 1. Vaccinations What is Vaccination? A method of inducing artificial immunity by exposing
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve
Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve Outline Selection methods Replacement methods Variation operators Selection Methods
2006 7.012 Problem Set 6 KEY
2006 7.012 Problem Set 6 KEY ** Due before 5 PM on WEDNESDAY, November 22, 2006. ** Turn answers in to the box outside of 68-120. PLEASE WRITE YOUR ANSWERS ON THIS PRINTOUT. 1. You create an artificial
B Cells and Antibodies
B Cells and Antibodies Andrew Lichtman, MD PhD Brigham and Women's Hospital Harvard Medical School Lecture outline Functions of antibodies B cell activation; the role of helper T cells in antibody production
Identifying Online Credit Card Fraud using Artificial Immune Systems
Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Identifying online credit card fraud using
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigate the
Autoimmunity and immunemediated. FOCiS. Lecture outline
1 Autoimmunity and immunemediated inflammatory diseases Abul K. Abbas, MD UCSF FOCiS 2 Lecture outline Pathogenesis of autoimmunity: why selftolerance fails Genetics of autoimmune diseases Therapeutic
Core Topic 2. The immune system and how vaccines work
Core Topic 2 The immune system and how vaccines work Learning outcome To be able to describe in outline the immune system and how vaccines work in individuals and populations Learning objectives Explain
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
