Title :
Human immune anomaly and misuse based detection for computer system operations: part II
Author :
Jucá, Kathia Regina L ; Boukerche, Azzedine ; Sobral, João Bosco M ; Notare, Mirela Sechi M Annoni
Abstract :
This paper is a follow up on our previous work on intrusion detection for computer systems. It is motivated by the accelerated growth of computer viruses in computer networks. Most applications and operational systems are overwhelmed by security failures at different levels. If there are no verification and monitoring procedures in the computational system, then security services (such as access control, firewalls and cryptography) become ineffective. In this paper, we present a security system for fraud detection of intruders and misuse of a mail system in a computer network environment. Our intrusion detection model is inspired by the natural immune system. This paper discusses our model, and presents preliminary results for both anomaly and operational misuse of the computer system.
Keywords :
authorisation; computer crime; computer network management; computer network reliability; computer viruses; electronic mail; fraud; anomaly detection; computer networks; computer system operations; computer viruses; fraud detection; intrusion detection; mail system; misuse based detection; natural immune system; security system; Acceleration; Access control; Application software; Computer networks; Computer viruses; Computerized monitoring; Condition monitoring; Humans; Immune system; Intrusion detection;
Conference_Titel :
Parallel and Distributed Processing Symposium, 2003. Proceedings. International
Print_ISBN :
0-7695-1926-1
DOI :
10.1109/IPDPS.2003.1213279