By Topic

Agent based Intrusion Detection System: A Computational Biology Approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
S. Janakiraman ; Dept. of Comput. Sci. & Eng., PSR Eng. Coll., Sivakasi ; V. Vasudevan ; S. Radhakrishnan

This paper is focused on network and agent based intrusion detection systems. This paper includes an overview of several IDS implementations. Many approaches based on hidden Markov models and various forms of finite state automata have been proposed to solve problem of detecting anomaly intrusion, a security attack in which an intruder assumes the identity of a legitimate user. It is proposed to give a general framework for IDS based on the application of techniques used in bioinformatics and agent technology. Our approach is focused on the application of techniques used in bioinformatics for a pair-wise sequence alignment and multiple sequence alignment to compare the monitored session with past user behavior. To achieve low false positive rate in this framework the intrusion can be detected by means of comparing the signature of the current user's session with already existing signatures of the potential intruder. The algorithms of computational biology such as approximation algorithm and Carillo-Lippman heuristic algorithm and sum-of-pairs scoring function are used to measure similarity between a sequence of commands produced by a potential intruder, the user signature and past intruder's signatures. Finally in this research work computational bioinformatics techniques and agent technology are used to offer security in host and network to yield a promising combination of intrusion detection rate and false positive rate

Published in:

India Conference, 2006 Annual IEEE

Date of Conference:

Sept. 2006