SHADuDT: Secure hypervisor-based anomaly detection using danger theory
نویسندگان
چکیده
Intrusion Detection based upon learning methods is an attractive approach in research community. These researches have two critical concerns: secure information gathering and accurate detection method. Here we used system calls together with their arguments as a suitable pattern for describing behavior of each process. In security applications, these patterns must be collected safely, so we proposed SHADuDT, a secure and robust hypervisor-based architecture for system call intercepting and information gathering that utilizes the second generation of Artificial Immune Systems (AIS) as intrusion detection method. Generally intrusion detection based on AISs fall into two categories. The first generation of AIS is inspired from adaptive immune reactions but the second one that is called danger theory focuses on both of these reactions to build a more biologicallyrealistic model of Human Immune System. Here we presented a novel Algorithm in Danger Theory field as SHADuDT detection method (SHADuDT_DM) for anomaly detection and utilized hypervisor architecture for SHADuDT secure auditor (SHADuDT_SA) to guarantee the safety of information gathering. We evaluated SHADuDT architecture through several criteria and compared its detection method with classic AIS methods for anomaly detection. These Evaluation results show considerable improvements in terms of detection performance and false alarm rates while keeping low overheads in execution time and memory by using the advantages of both hypervisor technology and Artificial Immune Systems. a 2013 Elsevier Ltd. All rights reserved.
منابع مشابه
STLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملA hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols
Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology – the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and lo...
متن کاملA Real-Time Dynamic Danger Theory Model for Anomaly Detection in File Systems
In the last few years, researchers have shown great interest in studying biologically inspired systems in the domain of computer science, sociology, economics and so on. Among these, computer science has made significant advances with biologically inspired theories fitted in every branch. The typical bio-inspired systems are artificial neural networks, evolutionary computation, DNA computation,...
متن کاملMalicious Code Execution Detection and Response Immune System inspired by the Danger Theory
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
متن کاملMalicious Code Execution Detection and Response Immune System inpired by the Danger Theory
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 39 شماره
صفحات -
تاریخ انتشار 2013