A Real-Time Dynamic Danger Theory Model for Anomaly Detection in File Systems
نویسنده
چکیده
In the last few years, researchers have shown great interest in studying biologically inspired systems in the domain of computer science, sociology, economics and so on. Among these, computer science has made significant advances with biologically inspired theories fitted in every branch. The typical bio-inspired systems are artificial neural networks, evolutionary computation, DNA computation, and now artificial immune systems. The immune system is a complex of cells, molecules and organs which has the capability of performing pattern recognition, self-learning, immune-memory, generation of diversity, noise tolerance, variation, distributed detection and optimization. Based on physiological immune principles, new computational techniques are being developed, giving us both a better understanding of the biological system, and solving engineering problems. In this thesis, after a brief introduction to the intrusion detection system, viruses, immune systems, danger theory and some background information, we describe a new model for a danger theory based artificial immune system in intrusion detection, specially, in the domain of anomaly detection of the file systems. We then describe an experiment done to test the correctness and efficiency of one of the lower layers of this model, in a simulated file system. We discover that the model can efficiently and rapidly detect many patterns, with low levels of false positives and false negatives, although it has some weaknesses detecting patterns occurring over a long time distance.
منابع مشابه
STLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملDynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...
متن کاملAnomaly Detection in Computer Security and an Application to File System Accesses
We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file systems to detect abnormal accesses. The File Wrapper Anomaly Detector (FWRAP) has two parts, a sensor that audits file systems, and an unsupervised machine learning system that computes normal models of those accesses. FWRAP employs...
متن کاملBehavior-Based Online Anomaly Detection for a Nationwide Short Message Service
As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. Over time, users' interactions with the network provides a vast amount of usage data. Thes...
متن کاملConsidering a Model for Sustainable Energy Planning Under Uncertainty
In this paper, real options theory is utilized to evaluate the effect of uncertain electricity and CO2 costs on speculation conduct. Methodologically, the allegiance of the newspaper in this appreciation is that uncertainty is not just stopped down as far as stochastic processes and their fluctuation, additionally as far as expected and acknowledged procedures, i.e. the procedures, w...
متن کامل