Please use this identifier to cite or link to this item:
http://drsr.daiict.ac.in//handle/123456789/76
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mathuria, Anish M. | |
dc.contributor.author | Kamra, Pooja | |
dc.date.accessioned | 2017-06-10T14:36:55Z | - |
dc.date.available | 2017-06-10T14:36:55Z | - |
dc.date.issued | 2005 | |
dc.identifier.citation | Kamra, Pooja (2005). ACIDS : automated co-stimulation based intrusion detection system with a sense of dynamic self. Dhirubhai Ambani Institute of Information and Communication Technology, viii, 79 p. (Acc.No: T00039) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/76 | - |
dc.description.abstract | Automated Co-stimulation based Intrusion detection system with a sense of Dynamic Self, or ACIDS, is a distributed architecture for intrusion detection systems. Other than the already used aspects of human immune systems like negative selection, clonal selection, gene expression etc., the novelty of ACIDS is that it incorporates two features of the human system not used previously, namely thymus and vaccination. <p/> <p/>Self is defined as the set of normal connections observed on the network. All the existing systems are modeling the self as a static entity, when it should have been otherwise. Also, human immune system needs two disparate signals before taking some action against the antigen. The first signal is generated at the point of attack and stimulates the immune system for rigorous detection. The second signal is known as co-stimulation, and it stimulates the immune system for taking the action against an antigen. All the existing artificial immune models are also seeking co-stimulation, but it is generated through human intervention. This makes them unusable in real time. Another drawback in the existing systems is that they start from the scratch, i.e. they do not derive knowledge from the existing data of the intrusions. <p/> <p/>ACIDS aims to overcome the above drawbacks of existing models. It includes a module called thymus that dynamically updates the self’s definition of the system. To best of our knowledge, this concept is being used for the first time in intrusion detection systems. In CIDS, hosts are monitored at two levels, network level and operating system level. Whenever an anomaly is detected at the network level, ACIDS monitors the activity of the processes in the host. If anomaly is detected there, system automatically generates the co-stimulation. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Intrusion detection system | |
dc.subject | Computer networks-security measures | |
dc.classification.ddc | 005.8 KAM | |
dc.title | ACIDS: automated co-stimulation based intrusion detection system with a sense of dynamic self | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 200311012 | |
dc.accession.number | T00039 | |
Appears in Collections: | M Tech Dissertations |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.