Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams

The National Strategy to Secure Cyberspace encourages individuals and organizations to identify vulnerabilities before a security breech occurs (PCIPB, 2003). Cabrera et al identify the detection of novel attacks as one of the most elusive and significant problems in intrusion detection (Cabrera, 20...

Full description

Bibliographic Details
Main Author: Johnson, Todd A.
Published: NSUWorks 2005
Subjects:
Online Access:http://nsuworks.nova.edu/gscis_etd/613
id ndltd-nova.edu-oai-nsuworks.nova.edu-gscis_etd-1612
record_format oai_dc
spelling ndltd-nova.edu-oai-nsuworks.nova.edu-gscis_etd-16122016-04-25T19:40:51Z Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams Johnson, Todd A. The National Strategy to Secure Cyberspace encourages individuals and organizations to identify vulnerabilities before a security breech occurs (PCIPB, 2003). Cabrera et al identify the detection of novel attacks as one of the most elusive and significant problems in intrusion detection (Cabrera, 2000). This sentiment is reiterated by other computer security researchers: (Endler, 1998), (Erbacher, 2002), (Ghosh, 1998) and (Lunt, 2000). A method to detect novel attacks has not been achieved because it implies the hopeless prerequisite of predicting the future. However, there has not been any research that attempts to automate the production of novel attacks. By automating the construction of novel attacks, the intrusion detection system (IDS) may be preemptively enhanced to recognize new attacks. The only difficulty is generating novel attacks. Motivated by the elusive and significant IDS vulnerability to unfamiliar attacks, the goal of this research was to create an evolutionary algorithm (EA) capable of creating original attacks. The EA, known as the Automated Vulnerability Detector (AVO), was designed to be capable of generating both known attacks and previously unknown attacks. It was believed that if these attacks could be discovered before they are used against the IDS, then the IDS could be upgraded proactively, rather than retroactively. The results demonstrate that the A VD can evolve new denial of service attacks. 2005-01-01T08:00:00Z text http://nsuworks.nova.edu/gscis_etd/613 CEC Theses and Dissertations NSUWorks Computer Sciences
collection NDLTD
sources NDLTD
topic Computer Sciences
spellingShingle Computer Sciences
Johnson, Todd A.
Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams
description The National Strategy to Secure Cyberspace encourages individuals and organizations to identify vulnerabilities before a security breech occurs (PCIPB, 2003). Cabrera et al identify the detection of novel attacks as one of the most elusive and significant problems in intrusion detection (Cabrera, 2000). This sentiment is reiterated by other computer security researchers: (Endler, 1998), (Erbacher, 2002), (Ghosh, 1998) and (Lunt, 2000). A method to detect novel attacks has not been achieved because it implies the hopeless prerequisite of predicting the future. However, there has not been any research that attempts to automate the production of novel attacks. By automating the construction of novel attacks, the intrusion detection system (IDS) may be preemptively enhanced to recognize new attacks. The only difficulty is generating novel attacks. Motivated by the elusive and significant IDS vulnerability to unfamiliar attacks, the goal of this research was to create an evolutionary algorithm (EA) capable of creating original attacks. The EA, known as the Automated Vulnerability Detector (AVO), was designed to be capable of generating both known attacks and previously unknown attacks. It was believed that if these attacks could be discovered before they are used against the IDS, then the IDS could be upgraded proactively, rather than retroactively. The results demonstrate that the A VD can evolve new denial of service attacks.
author Johnson, Todd A.
author_facet Johnson, Todd A.
author_sort Johnson, Todd A.
title Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams
title_short Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams
title_full Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams
title_fullStr Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams
title_full_unstemmed Applying Genetic Algorithms in the Identification of Novel Behavior Patterns in Network Data Streams
title_sort applying genetic algorithms in the identification of novel behavior patterns in network data streams
publisher NSUWorks
publishDate 2005
url http://nsuworks.nova.edu/gscis_etd/613
work_keys_str_mv AT johnsontodda applyinggeneticalgorithmsintheidentificationofnovelbehaviorpatternsinnetworkdatastreams
_version_ 1718248562382340096