A Hybrid Artificial Immune and Mobile Agent Intrusion Detection Based Model for Computer Network Operations

  • Authors:
  • R. B. Machado;A. Boukerche;J. B. M. Sobral;K. R. L. Juca;M. S. M. A. Notare

  • Affiliations:
  • Federal University of Santa Catarina;University of Ottawa, Ottawa, Canada;Federal University of Santa Catarina, Brazil;Federal University of Santa Catarina, Brazil;Barddal University

  • Venue:
  • IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the past decades to simulate various physical phenomena. By taking advantages of the main features of such models, coupled with nature based models such as artificial immune systems we present a novel artificial immune and agent based intrusion detection model for large computer networks. Our solution is based upon several security levels, event based model, and a simple computational abstraction where an anomaly detection technique is designed to monitor the users' registrations to the operational targeted system, e.g., UNIX-like implementation. In our model, the events' generation model is processed using the Unix Syslog-ng tool, the events' analysis using the Logcheck tool, while the activities of the users and the execution of the both reactive and pro-active events' activities are implemented within an artificial immune and mobile agent based infrastructure. We have implemented and designed our model to differentiate among attacks, security violations, and several other security levels. In this paper we present our model, and show how mobile agent and artificial immune paradigms can be used to design efficient intrusion detection systems. wealso discuss the validation of our model followed by a set of experiments we have carried out to evaluate the performance of our model using realistic case studies.