MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach

Pedro A. Diaz-Gomez, Dean F. Hougen

2007

Abstract

With the explosion of the Internet and its use, the development of security mechanims are quite important in order to preserve the confidentiality, integrity, and availability of data stored in computers. However, the growth of intrusions can make such mechanisms almost unusable, in the sense that the computation time or space needed in order to mantain them can grow exponentially. This position paper presents an iterative process for doing misuse detection, and compares it with another approach for doing that: a Genetic Algorithm.

References

  1. Bace, R. G. (2000). Intrusion Detection. MacMillan Technical Publishing, USA.
  2. Crosbie, M. and Spafford, G. (1995). Applying genetic programming to intrusion detection. In Proceedings of the AAAI Fall Symposium, pages 1-8.
  3. Denning, D. E. (1986). An intrusion-detection model. In Proceedings of the IEEE Symposium on Security and Privacy, pages 118-131.
  4. Diaz-Gomez, P. A. and Hougen, D. F. (2005a). Analysis and mathematical justification of a fitness function used in an intrusion detection system. In Proceedings of the Genetic and Evolutionary Computation Conference, pages 1591-1592.
  5. Diaz-Gomez, P. A. and Hougen, D. F. (2005b). Analysis of an off-line intrusion detection system: A case study in multi-objective genetic algorithms. In Proceedings of the Florida Artificial Intelligence Research Society Conference, pages 822-823.
  6. Diaz-Gomez, P. A. and Hougen, D. F. (2005c). Improved off-line intrusion detection using a genetic algorithm. In Proceedings of the 7th International Conference on Enterprise Information Systems, pages 66-73.
  7. Diaz-Gomez, P. A. and Hougen, D. F. (2006). A genetic algorithm approach for doing misuse detection in audit trail files. In Proceedings of the CIC-2006 International Conference on Computing, pages 329-335.
  8. Mé, L. (1993). Security audit trail analysis using genetic algorithms. In Proceedings of the 12th. International Conference on Computer Safety, Reliability, and Security, pages 329-340.
  9. Mé, L. (1998). GASSATA, a genetic algorithm as an alternative tool for security audit trail analysis. In Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection.
  10. Tjaden, B. C. (2004). Fundamentals of Secure Computer Systems. Franklin and Beedle & Associates.
Download


Paper Citation


in Harvard Style

A. Diaz-Gomez P. and F. Hougen D. (2007). MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-972-8865-89-4, pages 455-458. DOI: 10.5220/0002410804550458


in Bibtex Style

@conference{iceis07,
author={Pedro A. Diaz-Gomez and Dean F. Hougen},
title={MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2007},
pages={455-458},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002410804550458},
isbn={978-972-8865-89-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach
SN - 978-972-8865-89-4
AU - A. Diaz-Gomez P.
AU - F. Hougen D.
PY - 2007
SP - 455
EP - 458
DO - 10.5220/0002410804550458