Profiling network attacks via AIS

  • Authors:
  • Anastasia Pagnoni;Andrea Visconti

  • Affiliations:
  • Department of Computer Science and Communication, University of Milan, Milano, Italy;Department of Computer Science and Communication, University of Milan, Milano, Italy

  • Venue:
  • WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper extends the intrusion detection methodology proposed by Tarakanov et al. in [8] to k-dimensional shape spaces, for k greater or equal 2. k real vectors, representing antibodies, are used to recognize malicious (or, non-self) connection logs. We suggest a method for recognizing antigens (generating such antibodies) via Singular Value Decomposition of a real-valued matrix obtained by preprocessing a database of connection logs [9]. New incoming connection requests are recognized by the antibodies as either self (normal request), or non-self (potential attack), by (a) mapping them into a k-dimensional shape space, and (b) evaluating the minimum Hamming distance between their image and that of a known attack logs. It is easy to see that using a shape space of dimension greater than 2 significantly reduces false positives.