首页> 外文学位 >Anomaly intrusion detection and threat evaluation using artificial immunity model and fuzzy logic.
【24h】

Anomaly intrusion detection and threat evaluation using artificial immunity model and fuzzy logic.

机译:使用人工免疫模型和模糊逻辑进行异常入侵检测和威胁评估。

获取原文
获取原文并翻译 | 示例

摘要

This dissertation proposes a computer immunology model to detect anomaly intrusions from user and program behavior profiling based on a hierarchical fuzzy threat evaluation mechanism. The sequential data of commands from users and system calls from programs is used to construct finite automata which are identified with behavior profiles. The self and non-self behaviors from natural immune systems have been applied in this research to measure both the similarity and deviation of a case with the behavior profile. The values of fuzzy memberships can be calculated using a hierarchical fuzzy reasoning system by comparing test data with the finite automaton.; This dissertation also presents a new fuzzy risk analysis approach to identify a case as a linguistic term. The threat as fuzzy memberships can be converted into a generalized fuzzy number with the weight value. Then the synthesized number is compared with linguistic terms denoted as fuzzy numbers to measure the similarities one by one. The linguistic term that has the highest similarity with the synthesized fuzzy number is regarded as the final threat level to the system.; The computer immunology model is applied to detect masqueraders and intrusion scenarios from manipulating privileged processes to explore system vulnerabilities. Using truncated commands (without arguments) analysis, it improves upon seven other methods used to detect simulated masqueraders. Using enriched commands with arguments, this model can detect simulated masquerader data in a very short time interval. The immunology model also succeeds in detecting program anomaly behavior patterns and correctly identifying intrusion scenarios. A new experiment is described to detect intruders with the data set collected in a real computer system. The experimental results show that the computer immunology model is very effective and efficient to detect anomalies with real masquerader data. Some future research directions are discussed including user behavior profiling in GUI-based systems, and applying neural network and data mining to anomaly intrusion detection.
机译:本文提出了一种基于层次模糊威胁评估机制的计算机免疫学模型,用于从用户和程序行为分析中检测异常入侵。来自用户的命令和来自程序的系统调用的顺序数据用于构造有限自动机,这些自动机由行为配置文件标识。来自自然免疫系统的自我和非自我行为已被应用到这项研究中,以测量行为概况与案例的相似性和偏差。可以使用分层模糊推理系统通过将测试数据与有限自动机进行比较来计算模糊隶属度的值。本文还提出了一种新的模糊风险分析方法,将案件识别为语言术语。可以将威胁作为模糊隶属度转换为具有权重值的广义模糊数。然后将合成数字与表示为模糊数字的语言术语进行比较,以一对一地衡量相似性。与合成的模糊数具有最高相似性的语言术语被视为对系统的最终威胁等级。计算机免疫学模型被用于检测伪装者和入侵场景,这些伪装和入侵场景是通过操纵特权进程来探索系统漏洞的。使用截断的命令(无参数)分析,它改进了用于检测伪装的其他七种方法。使用带有参数的丰富命令,该模型可以在很短的时间间隔内检测到伪装的伪造数据。免疫学模型还可以成功检测程序异常行为模式并正确识别入侵场景。描述了一个新的实验,该实验利用在真实计算机系统中收集的数据集来检测入侵者。实验结果表明,计算机免疫模型非常有效,可以有效地检测出具有真实伪装数据的异常情况。讨论了一些未来的研究方向,包括基于GUI的系统中的用户行为分析,以及将神经网络和数据挖掘应用于异常入侵检测。

著录项

  • 作者

    Yu, Yingbing.;

  • 作者单位

    University of Louisville.;

  • 授予单位 University of Louisville.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2005
  • 页码 134 p.
  • 总页数 134
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号