1,093 research outputs found

    Adapting Artificial Immune Algorithms For University Timetabling

    Get PDF
    Penjadualan kelas dan peperiksaan di universiti adalah masalah pengoptimuman berkekangan tinggi. University class and examination timetabling are highly constrained optimization problems

    ICT Crime Cases Autopsy: Using the Adaptive Information Security Systems Model to Improve ICT Security

    Get PDF
    Summary This paper presents an analysis of ICT crimes using the adaptive information security systems model. There is a desire of being able to identify potential ICT victims so that measures could be taken to protect them. We briefly describe the crime theories, the top ten crimes, and the desire to have crime proofing products. We then describe the adaptive model for information security systems, and the architecture and the socio-technical system for analyzing ICT crimes. The analysis of the ICT crimes is presented. Finally, we present recommendations on how to improve on how to improve ICT security

    'An Artificial Immune System as a Recommender System for Web Sites'

    Get PDF
    Artificial Immune Systems have been used successfully to build recommender systems for film databases. In this research, an attempt is made to extend this idea to web site recommendation. A collection of more than 1000 individuals' web profiles (alternatively called preferences / favourites / bookmarks file) will be used. URLs will be classified using the DMOZ (Directory Mozilla) database of the Open Directory Project as our ontology. This will then be used as the data for the Artificial Immune Systems rather than the actual addresses. The first attempt will involve using a simple classification code number coupled with the number of pages within that classification code. However, this implementation does not make use of the hierarchical tree-like structure of DMOZ. Consideration will then be given to the construction of a similarity measure for web profiles that makes use of this hierarchical information to build a better-informed Artificial Immune System

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK

    Get PDF
    With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. Intrusion Prevention System (IPS) provides an in-line mechanism focus on identifying and blocking malicious network activity in real time. This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. Firstly, the current intrusions preventions systems, biological innate and adaptive immune systems, autonomic computing and self-healing mechanisms are studied and analyzed. The importance of intrusion prevention system recommends that artificial immune systems (AIS) should incorporate abstraction models from innate, adaptive immune system, pattern recognition, machine learning and self-healing mechanisms to present autonomous IPS system with fast and high accurate detection and prevention performance and survivability for critical services network system. Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. Finally, the validation of the system carried out by simulation tests, measuring, benchmarking and comparative studies. New benchmarking metrics for detection capabilities, prevention predictability trust and self-healing reliability are introduced as contributions for the IPS and SH system measuring and validation. Using the software system, design theories, AIS features, new nonlinear classification algorithm, and self-healing system show how the use of presented systems can ensure safety for critical services networks and heal the damage caused by intrusion. This autonomous system improves the performance of the current intrusion prevention system and carries on system continuity by using self-healing mechanism

    Aircraft Abnormal Conditions Detection, Identification, and Evaluation Using Innate and Adaptive Immune Systems Interaction

    Get PDF
    Abnormal flight conditions play a major role in aircraft accidents frequently causing loss of control. To ensure aircraft operation safety in all situations, intelligent system monitoring and adaptation must rely on accurately detecting the presence of abnormal conditions as soon as they take place, identifying their root cause(s), estimating their nature and severity, and predicting their impact on the flight envelope.;Due to the complexity and multidimensionality of the aircraft system under abnormal conditions, these requirements are extremely difficult to satisfy using existing analytical and/or statistical approaches. Moreover, current methodologies have addressed only isolated classes of abnormal conditions and a reduced number of aircraft dynamic parameters within a limited region of the flight envelope.;This research effort aims at developing an integrated and comprehensive framework for the aircraft abnormal conditions detection, identification, and evaluation based on the artificial immune systems paradigm, which has the capability to address the complexity and multidimensionality issues related to aircraft systems.;Within the proposed framework, a novel algorithm was developed for the abnormal conditions detection problem and extended to the abnormal conditions identification and evaluation. The algorithm and its extensions were inspired from the functionality of the biological dendritic cells (an important part of the innate immune system) and their interaction with the different components of the adaptive immune system. Immunity-based methodologies for re-assessing the flight envelope at post-failure and predicting the impact of the abnormal conditions on the performance and handling qualities are also proposed and investigated in this study.;The generality of the approach makes it applicable to any system. Data for artificial immune system development were collected from flight tests of a supersonic research aircraft within a motion-based flight simulator. The abnormal conditions considered in this work include locked actuators (stabilator, aileron, rudder, and throttle), structural damage of the wing, horizontal tail, and vertical tail, malfunctioning sensors, and reduced engine effectiveness. The results of applying the proposed approach to this wide range of abnormal conditions show its high capability in detecting the abnormal conditions with zero false alarms and very high detection rates, correctly identifying the failed subsystem and evaluating the type and severity of the failure. The results also reveal that the post-failure flight envelope can be reasonably predicted within this framework

    From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods

    Get PDF
    Over the last five years there has been an increase in the frequency and diversity of network attacks. This holds true, as more and more organisations admit compromises on a daily basis. Many misuse and anomaly based Intrusion Detection Systems (IDSs) that rely on either signatures, supervised or statistical methods have been proposed in the literature, but their trustworthiness is debatable. Moreover, as this work uncovers, the current IDSs are based on obsolete attack classes that do not reflect the current attack trends. For these reasons, this paper provides a comprehensive overview of unsupervised and hybrid methods for intrusion detection, discussing their potential in the domain. We also present and highlight the importance of feature engineering techniques that have been proposed for intrusion detection. Furthermore, we discuss that current IDSs should evolve from simple detection to correlation and attribution. We descant how IDS data could be used to reconstruct and correlate attacks to identify attackers, with the use of advanced data analytics techniques. Finally, we argue how the present IDS attack classes can be extended to match the modern attacks and propose three new classes regarding the outgoing network communicatio
    corecore