Accession Number : ADA471537


Title :   An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions


Descriptive Note : Master's thesis


Corporate Author : AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT


Personal Author(s) : Haag, Charles R


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/a471537.pdf


Report Date : Mar 2007


Pagination or Media Count : 224


Abstract : Today's predominantly-employed signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus after a potentially successful attack, performing post-mortem analysis on that instance and encoding it into a signature that is stored in its anomaly database. The time required to perform these tasks provides a window of vulnerability to DoD computer systems. Further, because of the current maximum size of an Internet Protocol-based message, the database would have to be able to maintain 256(to the power of 65535) possible signature combinations. In order to tighten this response cycle within storage constraints, this thesis presents an Artificial Immune System-inspired Multiobjective Evolutionary Algorithm intended to measure the vector of trade-off solutions among detectors with regard to two independent objectives: best classification fitness and optimal hypervolume size. Modeled in the spirit of the human biological immune system and intended to augment DoD network defense systems, our algorithm generates network traffic detectors that are dispersed throughout the network. These detectors promiscuously monitor network traffic for exact and variant abnormal system events, based on only the detector's own data structure and the ID domain truth set, and respond heuristically. The application domain employed for testing was the MIT-DARPA 1999 intrusion detection data set, composed of 7.2 million packets of notional Air Force Base network traffic. Results show our proof-of-concept algorithm correctly classifies at best 86.48% of the normal and 99.9% of the abnormal events, attributed to a detector affinity threshold typically between 39-44%. Further, four of the 16 intrusion sequences were classified with a 0% false positive rate.


Descriptors :   *ALGORITHMS , *COMPUTER NETWORKS , *BIONICS , *INTRUSION DETECTION(COMPUTERS) , STOCHASTIC PROCESSES , THESES , TRADE OFF ANALYSIS , INFORMATION SECURITY , IMMUNITY , HEURISTIC METHODS , DATA STORAGE SYSTEMS , SIGNATURES


Subject Categories : Numerical Mathematics
      Computer Systems Management and Standards
      Bionics


Distribution Statement : APPROVED FOR PUBLIC RELEASE