Loading…
Host-based intrusion detection systems adapted from agent-based artificial immune systems
Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to ABIDS, where agents coordinate one another to calculate mature context antigen val...
Saved in:
Published in: | Neurocomputing (Amsterdam) 2012-07, Vol.88, p.78-86 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083 |
---|---|
cites | cdi_FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083 |
container_end_page | 86 |
container_issue | |
container_start_page | 78 |
container_title | Neurocomputing (Amsterdam) |
container_volume | 88 |
creator | Ou, Chung-Ming |
description | Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to ABIDS, where agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses. The intelligence behind ABIDS is based on the danger theory and the functionalities of dendritic cells in human immune systems, while dendritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. This ABIDS is based on the dual detections of DC agents for signals and TC agents for antigens. ABAIS is an intelligent system with learning and memory capabilities. According to MCAVs, immune response to malicious behaviors is activated by either computer host or Security Operating Center. Accordingly, computer hosts met with malicious intrusions can be effectively detected by input signals and temporary output signals such as PAMP, danger and safe signals. |
doi_str_mv | 10.1016/j.neucom.2011.07.031 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1417883670</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0925231212000082</els_id><sourcerecordid>1417883670</sourcerecordid><originalsourceid>FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083</originalsourceid><addsrcrecordid>eNp9kLFOwzAQhi0EEqXwBgwZWRJ8duPYCxKqgCJVYoGByXLtC3KVxMV2kPr2pCpdme6G__t19xFyC7QCCuJ-Ww042tBXjAJUtKkohzMyA9mwUjIpzsmMKlaXjAO7JFcpbSmFBpiakc9VSLncmISu8EOOY_JhKBxmtPmwpX3K2KfCOLPLU6aNoS_MFw4nyMTsW2-96Qrf9-OAJ-SaXLSmS3jzN-fk4_npfbkq128vr8vHdWk5V7kUNePC0E1dK6XAUcmMk61BapnjdNoBnAKBBoSBdrqbGyutaje1EkpSyefk7ti7i-F7xJR175PFrjMDhjFpWEAjJRcNnaKLY9TGkFLEVu-i703ca6D6YFJv9dGkPpjUtNGTyQl7OGI4vfHjMepkPQ4WnY-TJu2C_7_gF5wzf5A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1417883670</pqid></control><display><type>article</type><title>Host-based intrusion detection systems adapted from agent-based artificial immune systems</title><source>Elsevier</source><creator>Ou, Chung-Ming</creator><creatorcontrib>Ou, Chung-Ming</creatorcontrib><description>Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to ABIDS, where agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses. The intelligence behind ABIDS is based on the danger theory and the functionalities of dendritic cells in human immune systems, while dendritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. This ABIDS is based on the dual detections of DC agents for signals and TC agents for antigens. ABAIS is an intelligent system with learning and memory capabilities. According to MCAVs, immune response to malicious behaviors is activated by either computer host or Security Operating Center. Accordingly, computer hosts met with malicious intrusions can be effectively detected by input signals and temporary output signals such as PAMP, danger and safe signals.</description><identifier>ISSN: 0925-2312</identifier><identifier>EISSN: 1872-8286</identifier><identifier>DOI: 10.1016/j.neucom.2011.07.031</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Agent ; Antigens ; Artificial immune system ; Computer information security ; Danger theory ; Dendritic cell algorithm ; Direct current ; Human ; Immune systems ; Intrusion ; Intrusion detection ; Learning ; Mathematical analysis</subject><ispartof>Neurocomputing (Amsterdam), 2012-07, Vol.88, p.78-86</ispartof><rights>2012 Elsevier B.V.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083</citedby><cites>FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Ou, Chung-Ming</creatorcontrib><title>Host-based intrusion detection systems adapted from agent-based artificial immune systems</title><title>Neurocomputing (Amsterdam)</title><description>Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to ABIDS, where agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses. The intelligence behind ABIDS is based on the danger theory and the functionalities of dendritic cells in human immune systems, while dendritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. This ABIDS is based on the dual detections of DC agents for signals and TC agents for antigens. ABAIS is an intelligent system with learning and memory capabilities. According to MCAVs, immune response to malicious behaviors is activated by either computer host or Security Operating Center. Accordingly, computer hosts met with malicious intrusions can be effectively detected by input signals and temporary output signals such as PAMP, danger and safe signals.</description><subject>Agent</subject><subject>Antigens</subject><subject>Artificial immune system</subject><subject>Computer information security</subject><subject>Danger theory</subject><subject>Dendritic cell algorithm</subject><subject>Direct current</subject><subject>Human</subject><subject>Immune systems</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>Learning</subject><subject>Mathematical analysis</subject><issn>0925-2312</issn><issn>1872-8286</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNp9kLFOwzAQhi0EEqXwBgwZWRJ8duPYCxKqgCJVYoGByXLtC3KVxMV2kPr2pCpdme6G__t19xFyC7QCCuJ-Ww042tBXjAJUtKkohzMyA9mwUjIpzsmMKlaXjAO7JFcpbSmFBpiakc9VSLncmISu8EOOY_JhKBxmtPmwpX3K2KfCOLPLU6aNoS_MFw4nyMTsW2-96Qrf9-OAJ-SaXLSmS3jzN-fk4_npfbkq128vr8vHdWk5V7kUNePC0E1dK6XAUcmMk61BapnjdNoBnAKBBoSBdrqbGyutaje1EkpSyefk7ti7i-F7xJR175PFrjMDhjFpWEAjJRcNnaKLY9TGkFLEVu-i703ca6D6YFJv9dGkPpjUtNGTyQl7OGI4vfHjMepkPQ4WnY-TJu2C_7_gF5wzf5A</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Ou, Chung-Ming</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120701</creationdate><title>Host-based intrusion detection systems adapted from agent-based artificial immune systems</title><author>Ou, Chung-Ming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Agent</topic><topic>Antigens</topic><topic>Artificial immune system</topic><topic>Computer information security</topic><topic>Danger theory</topic><topic>Dendritic cell algorithm</topic><topic>Direct current</topic><topic>Human</topic><topic>Immune systems</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>Learning</topic><topic>Mathematical analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ou, Chung-Ming</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Neurocomputing (Amsterdam)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ou, Chung-Ming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Host-based intrusion detection systems adapted from agent-based artificial immune systems</atitle><jtitle>Neurocomputing (Amsterdam)</jtitle><date>2012-07-01</date><risdate>2012</risdate><volume>88</volume><spage>78</spage><epage>86</epage><pages>78-86</pages><issn>0925-2312</issn><eissn>1872-8286</eissn><abstract>Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to ABIDS, where agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses. The intelligence behind ABIDS is based on the danger theory and the functionalities of dendritic cells in human immune systems, while dendritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. This ABIDS is based on the dual detections of DC agents for signals and TC agents for antigens. ABAIS is an intelligent system with learning and memory capabilities. According to MCAVs, immune response to malicious behaviors is activated by either computer host or Security Operating Center. Accordingly, computer hosts met with malicious intrusions can be effectively detected by input signals and temporary output signals such as PAMP, danger and safe signals.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.neucom.2011.07.031</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0925-2312 |
ispartof | Neurocomputing (Amsterdam), 2012-07, Vol.88, p.78-86 |
issn | 0925-2312 1872-8286 |
language | eng |
recordid | cdi_proquest_miscellaneous_1417883670 |
source | Elsevier |
subjects | Agent Antigens Artificial immune system Computer information security Danger theory Dendritic cell algorithm Direct current Human Immune systems Intrusion Intrusion detection Learning Mathematical analysis |
title | Host-based intrusion detection systems adapted from agent-based artificial immune systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T18%3A15%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Host-based%20intrusion%20detection%20systems%20adapted%20from%20agent-based%20artificial%20immune%20systems&rft.jtitle=Neurocomputing%20(Amsterdam)&rft.au=Ou,%20Chung-Ming&rft.date=2012-07-01&rft.volume=88&rft.spage=78&rft.epage=86&rft.pages=78-86&rft.issn=0925-2312&rft.eissn=1872-8286&rft_id=info:doi/10.1016/j.neucom.2011.07.031&rft_dat=%3Cproquest_cross%3E1417883670%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c339t-65236a0b559991d082ad8fae0c2d30ad811d916ea16a1f0013ac8c9fb59698083%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1417883670&rft_id=info:pmid/&rfr_iscdi=true |