Abstract
The paper addresses to application of sequences alignment intellectual algorithms for the intrusion detection needs. These algorithms are used in bioinformatics to detect regions of similarity in several gene sequences. We propose two techniques of their utilization. Using the first technique it is possible to detect the mutations of attack, having a signature of it. The second technique is applicable to anomaly detection. We discuss what algorithms of sequences alignment can be used in these methods and show the effectiveness of these techniques on practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of ACM 19(8), 461–471 (1976)
Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology 48(3), 443–453 (1970)
Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. Journal of Molecular Biology 147, 195–197 (1981)
Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the Detection of Anomalous System Call Arguments. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 326–343. Springer, Heidelberg (2003)
Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255–264. ACM Press, New York (2002)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120–128. IEEE Computer Society Press, Los Alamitos (1996)
Data Mining Approaches for Intrusion Detection, http://www1.cs.columbia.edu/~sal/hpapers/USENIX/usenix.html
Leon, E., Nasraoui, O., Gomez, J.: Network Intrusion Detection Using Genetic Clustering. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol. 3103, pp. 1312–1313. Springer, Heidelberg (2004)
Computer Immune Systems, http://www.cs.unm.edu/~immsec/systemcalls.htm
Coull, S.E., Branch, J.W., Szymanski, B.K., Breimer, E.: Intrusion Detection: A Bioinformatics Approach. In: Proceedings of 19th Annual Computer Security Applications Conference, pp. 24–33. IEEE Computer Society, Los Alamitos (2003)
Li, N., Xia, C., Yang, Y., Wang, H.: An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. In: Proceedings of CSSE, vol. 3, pp. 964–969. IEEE Computer Society, Los Alamitos (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Markov, Y.A., Kalinin, M.O. (2010). Intellectual Intrusion Detection with Sequences Alignment Methods. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2010. Lecture Notes in Computer Science, vol 6258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14706-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-14706-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14705-0
Online ISBN: 978-3-642-14706-7
eBook Packages: Computer ScienceComputer Science (R0)