首页> 外文期刊>International journal of soft computing >A Study of Buffer Overflow Attack Detection Using Artifical Immune System Based Danger Theory
【24h】

A Study of Buffer Overflow Attack Detection Using Artifical Immune System Based Danger Theory

机译:基于危险理论的人工免疫系统对缓冲区溢出攻击检测的研究

获取原文
获取原文并翻译 | 示例
           

摘要

Intrusion attacks are causing major security problems in computer networks. Firewall has been useful for certain attacks but it has its own limitation and can be bypasses. Intrusion detection and prevention is the method of identifying and preventing unauthorized use, misuse and abuse of computer system by both insiders and external attackers. In this approach, the resistant principle of human body is applied to computer security. Existing systems of AIS based IDS suffers lot of drawbacks due to Inefficient Negative Selection algorithm. These systems have high false positive and negative errors as this algorithm mainly detects intrusion based on discrimination of self from non-self. So, Danger theory evolved. According to Danger theory, the immune system does not respond to non-self but to danger. Thus, there is no need to attack everything that is foreign. The foreign entity which causes damage to the cells has to be killed. The proposed system identifies the attack uses this theory. This system runs in a host machine connected to a computer network. Based on this theory, the host machine receives packets from all the nodes connected to a network and analyzes the packets for any dangerous executable components in its payload. If the dangerous executable components are present in the payload it is said to be infected by an intrusion attack and the packet is discarded.
机译:入侵攻击正在引起计算机网络中的主要安全问题。防火墙对于某些攻击很有用,但它有其自身的局限性,可以绕开。入侵检测和预防是识别和防止内部人员和外部攻击者未经授权使用,滥用和滥用计算机系统的方法。在这种方法中,人体的抵抗原理被应用到计算机安全中。由于无效的否定选择算法,基于AIS的IDS的现有系统存在许多缺陷。这些系统具有较高的误报率和误报率,因为该算法主要根据对自我与非自我的区分来检测入侵。因此,危险理论得到了发展。根据危险理论,免疫系统不是对非自我而是对危险做出反应。因此,不需要攻击所有外来的东西。造成细胞损伤的外来实体必须被杀死。所提出的系统使用此理论来识别攻击。该系统在连接到计算机网络的主机上运行。基于此理论,主机从连接到网络的所有节点接收数据包,并对数据包中有效负载中的任何危险可执行组件进行分析。如果有效载荷中存在危险的可执行组件,则可以说它已受到入侵攻击的感染,数据包将被丢弃。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号