Open Access Open Access  Restricted Access Subscription or Fee Access

Functioning of Intelligent Intrusion Detection and Prevention System (IIDPS)

S Murugan

Abstract


In this paper, the architecture of Intelligent Intrusion Detection and Prevention System is proposed. The intelligence element was introduced using Artificial intelligence techniques. The development of IIDPS was done as a protection from cyber-attacks. The TSAM is decision maker agent and PMM is the main controller agent. Although, the proposed system is a combination of different types of intelligent agents, hybrid architecture under real time constraints.

Full Text:

PDF

References


Zolkipli M.F., Jantan A. An Approach for Malware Behavior Identification and Classification. Proceeding of 3rd International Conference on Computer Research and Development. Shanghai: 2011 March 11-13; 191–4p.

Chou T.S., Yen K.K. Fuzzy Belief k-Nearest Neighbors Anomaly Detection of User to Root and Remote to Local Attacks. The 2007 IEEE Workshop on Information Assurance. United States Military Academy, West Point, NY. 207–13p.

Wang J. Internet Worm Early Detection and Response Mechanism. The Journal of China Universities of Posts and Telecommunications. 2007:14(3).

Wagner D., Soto P. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM Conference on Computer and communications Security, ACM. New York: 2002; 255–64p.

Tian R., Batten L., Versteeg S. Function Length as a Tool for Malware Classification. Proceedings of the 3rd International Conference on Malicious and Unwanted Software. Fairfax: 2008 October 7-8; 57–64p.

Petroni, Hicks M., Automated detection of persistent kernel and control-flow attacks. In Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM. 2007.

Nataraj L., Yegneswaran V., Porras P. et al. A Comparative Assessment of Malware Classification Using Binary Texture Analysis and Dynamic Analysis. Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. 2011: 21–30p.

Rieck K., Trinius P., Willems C. et al. Automatic Analysis of Malware Behavior Using Machine Learning. Journal of Computer Security. 2011: 19; 639–68p.

Park Y., Reeves D., Mulukutla V. et al. Fast Malware Classification by Automated Behavioral Graph Matching. Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research. 2010: 45.

Martignoni L., Christodorescu M., Jha S. Fast, generic, and safe unpacking of malware. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC). 2007: 431–41p.




DOI: https://doi.org/10.37628/jeset.v1i1.399

Refbacks

  • There are currently no refbacks.