![]() |
10.5120/ijca2017914214 |
Olubadeji Bukola and Adetunmbi A O.. Purging/Antirobustness as a Panacea for Attack Subversion and Autoimmunity on the Network. International Journal of Computer Applications 173(8):1-8, September 2017. BibTeX
@article{10.5120/ijca2017914214, author = {Olubadeji Bukola and Adetunmbi A. O.}, title = {Purging/Antirobustness as a Panacea for Attack Subversion and Autoimmunity on the Network}, journal = {International Journal of Computer Applications}, issue_date = {September 2017}, volume = {173}, number = {8}, month = {Sep}, year = {2017}, issn = {0975-8887}, pages = {1-8}, numpages = {8}, url = {http://www.ijcaonline.org/archives/volume173/number8/28352-2017914214}, doi = {10.5120/ijca2017914214}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Security of information is of utmost importance to any organization or individual, which depend on computer system or internet for business transaction or source of information or research. Many viruses are able to recognize certain anti-virus software, and respond differently to such software than to programs designed for other purposes. Some viruses go after the databases stored by anti-virus products. Some viruses simply go after anti-virus products, trying to erase them. Immune systems also face this daunting control challenge. On the one hand, there is need to minimize damage from pathogens, without wasting energy and resources, but on the other must avoid initiating or perpetuating autoimmune responses.
Several preventive measures including identification and authentication, logic access control, audit trails, digital signature and firewalls have been developed for the purpose of information security on system. As a result of inadequacies of these measures intrusion detection was introduced to complement these techniques and hence guarantee full protection of computing resources. Detection system is the process of identifying and detecting unauthorized access or abnormal incursions, actions and events in the system, which provides information for timely counter measures.
This paper presents a systematic approach to intrusion detection using machine learning techniques to purging in order to avoid autoimmunity on network. Machine learning is an automatic process of extracting hidden or interesting knowledge from data in order to generate its own rule based on the given set of data. In this paper rough set theory will be used as a mathematical tool to deal with imprecise and insufficient knowledge, finding hidden patterns in data and reduce dataset [12]. Appraisal of the shortcomings of the current intrusion detection systems (IDS) will be pointed out and the international knowledge discovery and data mining tools (KDD99) are used for benchmarking intrusion detection used, with the designing of rough-set model.
References
- Adetunmbi A. O., Falaki S. O., Adewale O. S. and Alese B. K. (2008). Network Intrusion Detection Based on Rough Set and K-Nearest Neighbour. International Journal of Computing and ICT Research, 2(1).
- Anderson, J.P.(1980). Computer Security threat monitoring and surveillance, Technical report, James P. Anderson co. Box 42, Fort Washington.
- Apache (2002). “Apache Chunk Buffer Overflow Attack”.
- Byunghae-Cha, K.P. And Jaittyun, S. (2005). Neural Networks Techniques for Host anomaly Intrusion Detection using Fixed Pattern Transformation. ICCSA 2005, LNCS 3481, 254-263
- Balasubramanuyan, J.S, Garcia-Fernadez, J.O., Isaacoff, D., Spafford, E., and Amboni,D.(1998) An architecture for intrusion detection using autonomous agent 14th Annual computer security conference(ACSAC’’98), pages 13-24’ IEEE. Computer society.
- Cobb, S. (1996) The NASA GUIDE TO PC AND LAN security, McGraw-Hill Book Company
- Cuppens F. and Ortalo R. (2000). “LAMBDA: A Language to Model a Database for Detection of Attacks”, In Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID’2000),Toulouse, France.
- Dacier M, Deswarte Y and Kaâniche M. (1996). “Models and Tools for Quantitative Assessment of Operational Security”, in 12th International Information Security Conference (IFIP/SEC'96), (S.K. Katsikas and D. Gritzalis,Eds.), 177-186, Chapman & Hall, Samos (Greece).
- Jiawei and Micheline, K.(2006) Data Mining: Concepts and techniques, second edition, Elsevier inc.
- Kendall, K. (1999) A database of computer attacks for the evaluation of intrusion detection systems, Masters thesis, Massachusetts institute of technology, USA.
- Krakauer, D.C. and Plotkin, J.B. (2005) Principles and parameters of molecular robustness. In Robust Design: A Repertoire of Biological, Ecological, and Engineering Case Studies (Jen, E., ed.), pp. 71–103, Oxford University Press
- Krakauer, D.C. (2005) Robustness in biological systems: a provisional taxonomy. In Complex Systems Science in Biomedicine (Deisboeck, T.S. and Kresh, Y., eds), pp. 185–207, Plenum
- Matzinger, P. (1998) An innate sense of danger. Semin. Immunol. 10, 399–415
- Pawlak, Z. (1982) Rough sets: international journal of computer and information science, vol. 11. No.5, pp. 341 - 356. 1982
- Schmidt-Hempel, P. (2005) The evolutionary ecology of insect immune defense. Annu. Rev. Immunol. 50, 529–551
- Slagel, M. (2001) the design and implementation of MAIDS (Mobile Agent for Intrusion Detection System) Master’s creative Component paper, Iowa state university, Ames Iowa.
- Sundaram, A. (1996). An Introduction to Intrusion detection.
- Spafford, E. (1989): internet worm program: an analysis ACM Communication Review, 19(1) 17-57.
Keywords
Autoimmunity, Purging, Intrusion detection, Rough Set Theory