Sciweavers

Share
ISSA
2004

Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection

8 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed to higher nodes in the hierarchy until the root node is reached. The root node is a command and control system that evaluates attack signatures and issues responses. Many single points of failure exist in an intrusion detection system (IDS) based on a hierarchical architecture that does not have redundant communication lines and the capability to dynamically reconfigure relationships in the case of failure of key components. For example, an attacker can cut off a control branch of the IDS by attacking an internal node or even interrupt the operation of the entire system by taking out the root command and control node. To solve this problem, we propose an IDS inspired by the human immune system. The architecture of the proposed IDS has no aggregation nodes or a root node that evaluates attack signatures. Instea...
Marek Zielinski
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2004
Where ISSA
Authors Marek Zielinski
Comments (0)
books