DocumentCode :
589797
Title :
Structural TLR algorithm for anomaly detection based on Danger Theory
Author :
Nejad, F.S. ; Salkhi, R. ; Azmi, Reza ; Pishgoo, Boshra
Author_Institution :
Oper. Syst. Security Lab. (OSSL), Alzahra Univ., Tehran, Iran
fYear :
2012
fDate :
13-14 Sept. 2012
Firstpage :
156
Lastpage :
161
Abstract :
Artificial Immune Systems have long been used in the field of computer security and especially in Intrusion Detection systems. The first generation of AISs which is inspired only by the adaptive immune system has some weak points and suffers from excessive amount of false alarms. The next generation of AISs is inspired by “Danger Theory” and tries to mimic the innate immune system along with the adaptive immune system of the body. Two algorithms named TLR and DCA are proposed in this new area that both of them are trying to identify the antigens based on a simple identifier. They suffer from low accuracy due to the fact that they are not taking the structure of antigens into account. In this paper we propose an algorithm called STLR (structural TLR), which is an extended form of TLR algorithm. STLR tries to model the interaction of adaptive and innate biological immune system and at the same time considers the structure of the antigens. In this algorithm, each system call represents an antigen whose structure is determined by the system call´s arguments and some other parameters. Our experimental results show that using the structural aspects of an antigen, STLR can lead to a great increase in the detection rate and accuracy.
Keywords :
artificial immune systems; security of data; AIS; DCA; IDS; STLR; adaptive biological immune system; adaptive immune system; anomaly detection; antigens; artificial immune systems; computer security; danger theory; innate biological immune system; innate immune system; intrusion detection systems; structural TLR algorithm; system call arguments; Accuracy; Adaptive systems; Intrusion detection; Lymph nodes; Signal processing algorithms; Training; Anomaly Detection; Antigen Structure; Atificial Immune Systems; Danger Theory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location :
Tabriz
Print_ISBN :
978-1-4673-2387-1
Type :
conf
DOI :
10.1109/ISCISC.2012.6408214
Filename :
6408214
Link To Document :
بازگشت