{"title":"A Study of Detection Probabilities and Real-World Testing of a Human Immunity Inspired Intrusion Detection System","authors":"Patryk Widulinski, K. Wawryn","doi":"10.23919/MIXDES52406.2021.9497536","DOIUrl":null,"url":null,"abstract":"In the paper, a study of detection probabilities and experimental tests of an intrusion detection system (IDS) utilizing the artificial immune system (AIS) based on the negative selection approach are presented. The algorithm uses binary strings called receptors to detect intrusions in programs in the operating system. In the work, a statistical approach is used to calculate the probabilities of detecting the intrusions and the results are compared with the experimental tests. New experiments are conducted using a virtual machine as the environment to check the effectiveness of the proposed IDS. For this purpose, real-world malware samples are launched in the virtual machine. The research of the IDS is then presented, analyzed and concluded.","PeriodicalId":375541,"journal":{"name":"2021 28th International Conference on Mixed Design of Integrated Circuits and System","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 28th International Conference on Mixed Design of Integrated Circuits and System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/MIXDES52406.2021.9497536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In the paper, a study of detection probabilities and experimental tests of an intrusion detection system (IDS) utilizing the artificial immune system (AIS) based on the negative selection approach are presented. The algorithm uses binary strings called receptors to detect intrusions in programs in the operating system. In the work, a statistical approach is used to calculate the probabilities of detecting the intrusions and the results are compared with the experimental tests. New experiments are conducted using a virtual machine as the environment to check the effectiveness of the proposed IDS. For this purpose, real-world malware samples are launched in the virtual machine. The research of the IDS is then presented, analyzed and concluded.