Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Mechanism for Generating Immunity-Based Agents that Detect Masqueraders

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2004)

Abstract

A new mechanism for generating agents, modeled on the immune system, has been incorporated into our previous immunity-based system for detecting masqueraders. Akin to T cells in the thymus, the agents capable of recognizing self from nonself, or legitimate users from masqueraders, are positively selected, while those that cannot are annihilated. In our experiments, our new system was better than our previous system at detecting external masqueraders. We also discuss the diversity and specificity of the agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lane, T.: Hidden markov models for human/computer interface modeling. In: Proc. of IJCAI 1999 Workshop on Learning about Users, pp. 35–44 (1999)

    Google Scholar 

  2. Okamoto, T., Watanabe, Y., Ishida, Y.: Test statistics for a masquerader detection system – a comparison between hidden markov model and other probabilistic models. Transactions of the ISCIE 16, 61–69 (2003)

    Google Scholar 

  3. Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science 16, 58–74 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  4. Okamoto, T., Watanabe, T., Ishida, Y.: Towards an immunity-based system for detecting masqueraders. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2774, pp. 488–495. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Delves, P.J., Roitt, I.M.: The Immune System—First of Two Parts. New England Journal of Medicine 343 (2000)

    Google Scholar 

  6. Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for unix processes. In: The 1996 IEEE Symposium on Security and Privacy, pp. 120–128 (1996)

    Google Scholar 

  7. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models. In: The 1999 IEEE Symposium on Security and Privacy, pp. 133–145 (1999)

    Google Scholar 

  8. Rabiner, L., Juang, B.: Fundamentals of speech recognition. Prentice Hall, Englewood Cliffs (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Okamoto, T., Watanabe, T., Ishida, Y. (2004). Mechanism for Generating Immunity-Based Agents that Detect Masqueraders. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2004. Lecture Notes in Computer Science(), vol 3214. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30133-2_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30133-2_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23206-3

  • Online ISBN: 978-3-540-30133-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics