Immune-inspired Network Intrusion Detection System (i-NIDS) 1 Next Generation Intelligent Networks Research Center National University of Computer & Emerging.

Slides:



Advertisements
Similar presentations
V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.
Advertisements

CIFD: Computational Immunology for Fraud Detection
Scalable Parallel Intrusion Detection Fahad Zafar Advising Faculty: Dr. John Dorband and Dr. Yaacov Yeesha 1 University of Maryland Baltimore County.
School of Cybernetics, School of Systems Engineering, University of Reading Presentation Skills Workshop March 22, ‘11 Diagnosis of Breast Cancer by Modular.
4 Intelligent Systems.
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack 42 nd Hawaii International Conference on System Sciences, Electrical.
1 Evolvable Malware Sadia Noreen, Sahafq Murtaza, M. Zubair Shafiq, Muddassar Farooq National University of Computer and Emerging Sciences (FAST-NUCES)
Anomaly Detection in Data Docent Xiao-Zhi Gao
Anomaly Based Intrusion Detection System
NEW TIES year 2 review NEW TIES = New and Emergent World models Through Individual, Evolutionary and Social learning.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Evolving Neural Networks in Classification Sunghwan Sohn.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Genetic Algorithms Learning Machines for knowledge discovery.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
INTRODUCTION TO COMPUTATIONAL INTELLIGENCE, Nanjing University Spring 2014 INTRODUCTION TO COMPUTATIONAL INTELLIGENCE Lin Shang Dept. of Computer Science.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Automated malware classification based on network behavior
Muhammad Shahzad 1, Saira Zahid 1, Syed Ali Khayam 1,2, Muddassar Farooq 1 1 Next Generation Intelligent Networks Research Center National University of.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Soft Computing and Expert System Laboratory Indian Institute of Information Technology and Management Gwalior MTech Thesis Fourth Evaluation Fusion of.
Artificial Intelligence Lecture No. 28 Dr. Asad Ali Safi ​ Assistant Professor, Department of Computer Science, COMSATS Institute of Information Technology.
Department of Information Technology Indian Institute of Information Technology and Management Gwalior AASF hIQ 1 st Nov ‘09 Department of Information.
Grant Dick Department of Information Science, School of Business, University of Otago, Dunedin, NZ 21/11/2009Australasian.
CSI Evolutionary Computation Fall Semester, 2009.
Intrusion Detection Using Hybrid Neural Networks Vishal Sevani ( )
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Rogério de LemosDEFINE – Pisa, November 2002 – 1 Proactive Computing: Artificial Immune Systems Rogério de Lemos University of Kent at Canterbury  Brian.
Mehdi Ghayoumi MSB rm 132 Ofc hr: Thur, a Machine Learning.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
RECENT DEVELOPMENTS OF INDUCTION MOTOR DRIVES FAULT DIAGNOSIS USING AI TECHNIQUES 1 Oly Paz.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
Chapter 5: Implementing Intrusion Prevention
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
1 5. Application Examples 5.1. Programmable compensation for analog circuits (Optimal tuning) 5.2. Programmable delays in high-speed digital circuits (Clock.
Design, Control and Fault Diagnosis of Industrial Drives Department of Electrical and Computer Engineering University of Tehran August 25, 2004 Control.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Evolving Reactive NPCs for the Real-Time Simulation Game.
A Deception Framework for Survivability Against Next Generation Cyber Attacks Ruchika Mehresh and Shambhu Upadhyaya Department of Computer Science and.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Pac-Man AI using GA. Why Machine Learning in Video Games? Better player experience Agents can adapt to player Increased variety of agent behaviors Ever-changing.
Artificial Intelligence Center,
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Evolving, Adaptable Visual Processing System Simon Fung-Kee-Fung.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Chapter 1. Introduction in Creating Brain-like intelligence, Sendhoff et al. Course: Robots Learning from Humans Bae, Eun-bit Otology Laboratory Seoul.
An Evolutionary Algorithm for Neural Network Learning using Direct Encoding Paul Batchis Department of Computer Science Rutgers University.
Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis.
October 20-23rd, 2015 Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features Joshua Saxe, Dr. Konstantin Berlin Invincea.
Snort – IDS / IPS.
Machine Learning for Computer Security
Evolvable Malware Sadia Noreen, Sahafq Murtaza, M. Zubair Shafiq, Muddassar Farooq National University of Computer and Emerging Sciences (FAST-NUCES) Next.
Immune-inspired Network Intrusion Detection System (i-NIDS)
Sistem Kecerdasan Buatan
TECHNOLOGY GUIDE FOUR Intelligent Systems.
Bioagents and Biorobots David Kadleček, Michal Petrus, Pavel Nahodil
Introduction to Soft Computing
Behavior based User Authentication on Smart Phones
George Rush Modified by Dr. T
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
George Rush Modified by Dr. T
Sampling based Mission Planning for Multiple Robots
Presentation transcript:

Immune-inspired Network Intrusion Detection System (i-NIDS) 1 Next Generation Intelligent Networks Research Center National University of Computer & Emerging Sciences Islamabad, Pakistan M. Zubair Shafiq 1, Syed Ali Khayam 2, Muddassar Farooq 1 GECCO HUMIES School of Electrical Engineering & Computer Sciences National University of Sciences & Technology Rawalpindi, Pakistan

2 Introduction Simple Human competitive Human^ machine competitive

3 Unfortunately, most computer viruses are not so courteous!

4 Threat numbers show the story of what’s happening?

5 Signature matching!Size of signature database cannot scale!Inability to detect zero-day (novel) attacks! These are Commercial Software…

6 Motivation for current work A self-healing, self-defending and living artificial immune system Proactive defense against zero-day attacks Mapping concepts from A-life and evolution

7 Network Traffic Stream Intelligent Statistical Features 1.Memory of Markov Chain 2.Multi resolution session rate 3.Entropy of IP address 4.Divergence of port distribution Immune inspired Network Intrusion Detection System Alarm Output Adaptive Immune System/ Innate Immune System 1.Negative Selection 2.Dendritic Cell Algorithm

8 Human^ machine Competitive Results DetectorTP rate (%)FP rate (%) [Classical Bio-inspired Detector] Naïve RVNS [Classical Bio-inspired Detector] Naïve DCA [State-of-the-art Statistical Detector] Rate Limiting [State-of-the-art Statistical Detector] Maximum Entropy [Immune inspired NIDS] i-RVNS [Immune inspired NIDS] i-DCA

9 Engineered System Complete version will be ready in 1 year time; free download Patent pending US$200,000 grant to develop the final product from the National ICT R&D fund, Government of Pakistan

10 Why the best? In a nutshell… 1. Hard problem in hard domain; impossible for a human to solve 2. Evolved system better than human developed, commercial anti- virus software 3. Evolved system better than state-of-the-art statistical malware detectors 4. Hybrid of statistical-immune detectors; best of both worlds5. Engineered product; open-source initiative

11 Publications A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection M. Zubair Shafiq, Muddassar Farooq and Syed Ali Khayam In M. Giacobini et al.(Eds.), Proceedings of Applications of Evolutionary Computing, EvoWorkshops 2007 (EuroGP-EvoCoMnet), Volume 4974 of Lecture Notes in Computer Science, pp. 48–57, Springer Verlag, Napoli, Italy, March,2008. (BEST PAPER NOMINATION) Improving the Accuracy of Immune-inspired Malware Detectors by using Intelligent Features M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq In Genetic and Evolutionary Conference (GECCO), July, 2008, Atlanta, USA.

12