Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11893004_16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards an immunity-based anomaly detection system for network traffic

Published: 09 October 2006 Publication History

Abstract

We have applied our previous immunity-based system to anomaly detection for network traffic, and confirmed that our system outperformed the single-profile method. For internal masquerader detection, the missed alarm rate was 11.21% with no false alarms. For worm detection, four random-scanning worms and the simulated metaserver worm were detected with no missed alarms and no false alarms, while a simulated passive worm was detected with a missed alarm rate of 80.57%.

References

[1]
Williamson, M.M.: Throttling viruses: restricting propagation to defeat malicious mobile code. In: ACSAC Security Conference 2002. (2002) 61-68.
[2]
Okamoto, T.: A worm filter based on the number of unacknowledged requests. In: KES 2005, LNAI 3682 (2005) 93-99.
[3]
Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: The 2003 ACM Workshop on Rapid Malcode, ACM Press (2003) 11-18.
[4]
Okamoto, T., Watanabe, T., Ishida, Y.: Towards an immunity-based system for detecting masqueraders. In: KES 2003, LNAI 2774 (2003) 488-495.
[5]
Okamoto, T., Watanabe, T., Ishida, Y.: Mechanism for generating immunity-based agents that detect masqueraders. In: KES 2004, LNAI 3214 (2004) 534-540.
[6]
Okamoto, T., Watanabe, Y., Ishida, Y.: Test statistics for a masquerader detection system - a comparison between hidden markov model and other probabilistic models. Transactions of the ISCIE 16(2) (2003) 61-69.
[7]
Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science 16(1) (2001) 58-74.

Cited By

View all
  • (2007)Framework of an immunity-based anomaly detection system for user behaviorProceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III10.5555/1771230.1771344(821-829)Online publication date: 12-Sep-2007

Index Terms

  1. Towards an immunity-based anomaly detection system for network traffic
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    KES'06: Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
    October 2006
    1335 pages
    ISBN:3540465375
    • Editors:
    • Bogdan Gabrys,
    • Robert J. Howlett,
    • Lakhmi C. Jain

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 09 October 2006

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2007)Framework of an immunity-based anomaly detection system for user behaviorProceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III10.5555/1771230.1771344(821-829)Online publication date: 12-Sep-2007

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media