Abstract

This paper is focused on network and agent based intrusion detection systems. This paper includes an overview of several IDS implementations. Many approaches based on hidden Markov models and various forms of finite state automata have been proposed to solve problem of detecting anomaly intrusion, a security attack in which an intruder assumes the identity of a legitimate user. It is proposed to give a general framework for IDS based on the application of techniques used in bioinformatics and agent technology. Our approach is focused on the application of techniques used in bioinformatics for a pair-wise sequence alignment and multiple sequence alignment to compare the monitored session with past user behavior. To achieve low false positive rate in this framework the intrusion can be detected by means of comparing the signature of the current user's session with already existing signatures of the potential intruder. The algorithms of computational biology such as approximation algorithm and Carillo-Lippman heuristic algorithm and sum-of-pairs scoring function are used to measure similarity between a sequence of commands produced by a potential intruder, the user signature and past intruder's signatures. Finally in this research work computational bioinformatics techniques and agent technology are used to offer security in host and network to yield a promising combination of intrusion detection rate and false positive rate

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.