Abstract
This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion recovery and attack signature extraction. These features are enabled through attack evidence detection. This IDS is initially designed to deal with application attacks, extracting signature for remote buffer overflow attacks. ADenoIdS is described in this paper and experimental results are also presented. These results show that ADenoIdS can discard false-positives and extract signatures which match the attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Garfinkel, S., Spafford, G.: Practical UNIX & Internet Security, 2nd edn. O’Reilly and Associates, Sebastopol (1996)
Pethia, R.: Computer Security. Cert Coordidantion Center, Available on the web at http://www.cert.org/congressional_testimony/Pethia_testimony_Mar9.html (2000)
Bace, R.: Intrusion Detection, 1st edn. Macmillan Technical Publishing, Basingstoke (2000)
Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 8, 443–473 (2000)
Dasgupta, D.: Immunity-Based Intrusion Detection System: A General Framework. In: Proceedings of the 22nd National Information System Security Conference, pp. 147–160 (1999)
Kim, J., Bentley, P.: An Artificial Immune Model for Network Intrusion Detection. In: Proceedings of the 7th European Congress on Intelligent Techniques and Soft Computing (1999)
Kephart, J.: A Biologically Inspired Immune System for Computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, pp. 130–139 (1994)
CERT Coordination Center: CERT Summaries 1995-2003, Available on the web at http://www.cert.org/summaries (2004)
de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach, 1st edn. Springer, Heidelberg (2002)
Haile, J., McMillen, R.: Snort-inline tool, Available on the web at http://project.honeynet.org/papers/honeynet/tools (2004)
Kim, J., Bentley, P.: Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 1330–1337 (2001)
Provos, N.: Improving Host Security with System Call Policies. In: Proceedings of the 12th USENIX Security Symposium (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
de Paula, F.S., de Geus, P.L. (2004). Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS . In: de Souza, J.N., Dini, P., Lorenz, P. (eds) Telecommunications and Networking - ICT 2004. ICT 2004. Lecture Notes in Computer Science, vol 3124. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27824-5_141
Download citation
DOI: https://doi.org/10.1007/978-3-540-27824-5_141
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22571-3
Online ISBN: 978-3-540-27824-5
eBook Packages: Springer Book Archive