• DocumentCode
    589797
  • Title

    Structural TLR algorithm for anomaly detection based on Danger Theory

  • Author

    Nejad, F.S. ; Salkhi, R. ; Azmi, Reza ; Pishgoo, Boshra

  • Author_Institution
    Oper. Syst. Security Lab. (OSSL), Alzahra Univ., Tehran, Iran
  • fYear
    2012
  • fDate
    13-14 Sept. 2012
  • Firstpage
    156
  • Lastpage
    161
  • Abstract
    Artificial Immune Systems have long been used in the field of computer security and especially in Intrusion Detection systems. The first generation of AISs which is inspired only by the adaptive immune system has some weak points and suffers from excessive amount of false alarms. The next generation of AISs is inspired by “Danger Theory” and tries to mimic the innate immune system along with the adaptive immune system of the body. Two algorithms named TLR and DCA are proposed in this new area that both of them are trying to identify the antigens based on a simple identifier. They suffer from low accuracy due to the fact that they are not taking the structure of antigens into account. In this paper we propose an algorithm called STLR (structural TLR), which is an extended form of TLR algorithm. STLR tries to model the interaction of adaptive and innate biological immune system and at the same time considers the structure of the antigens. In this algorithm, each system call represents an antigen whose structure is determined by the system call´s arguments and some other parameters. Our experimental results show that using the structural aspects of an antigen, STLR can lead to a great increase in the detection rate and accuracy.
  • Keywords
    artificial immune systems; security of data; AIS; DCA; IDS; STLR; adaptive biological immune system; adaptive immune system; anomaly detection; antigens; artificial immune systems; computer security; danger theory; innate biological immune system; innate immune system; intrusion detection systems; structural TLR algorithm; system call arguments; Accuracy; Adaptive systems; Intrusion detection; Lymph nodes; Signal processing algorithms; Training; Anomaly Detection; Antigen Structure; Atificial Immune Systems; Danger Theory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
  • Conference_Location
    Tabriz
  • Print_ISBN
    978-1-4673-2387-1
  • Type

    conf

  • DOI
    10.1109/ISCISC.2012.6408214
  • Filename
    6408214