Skip to main content

Security Audit Trail Analysis Using Genetic Algorithms

  • Conference paper
  • First Online:

Abstract

We propose a security audit trail analysis approach based on predefined attack scenarios and using genetic algorithms. This paper shows the validity of this approach and presents some of its problems.

Pierre Rolin (Télécom Bretagne) supervises this PhD work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Salz R. Computer Oracle and Password System (COPS). Internet Newsgroup Article (comp. sources.unix), 1990

    Google Scholar 

  2. Denning D.E. An Intrusion-Detection Model. IEEE transaction on Software Engineering 1987; Vol.13, N∘2

    Google Scholar 

  3. Debar H, Becker M, Siboni D. A Neural Network Component for an Intrusion Detection System. In: Proceedings of the IEEE Symposium of Research in Computer Security and Privacy, 1992

    Google Scholar 

  4. Lunt T.F, Tamaru A, Gilham F, Jagannathan R, Jalali C, Javitz H.S, Valdes A, Neumann P.G. A real-Time Intrusion-Detection Expert System. SRI International, Technical Report, 1990

    Google Scholar 

  5. Lunt T.F, Tamaru A, Gilham F, Jagannathan R, Neumann P.G, Jalali C. IDES: A Progress Report. In: Computer Security Application, Proceedings, 1990

    Google Scholar 

  6. GaryeyT.D, Lunt T.F. Model-based Intrusion Detection. In: Proceedings of the 14th National Computer Security Conference , 1991

    Google Scholar 

  7. Aho A.V: Algorithms for Finding Patterns in Strings. In: Handbook of Theoretical Computer Science. J. Van Leeuwen, 1990

    Google Scholar 

  8. Goldberg D.E. Genetic Algorithms in search, Optimization and Machine Learning. AddisonWesley, 1989

    Google Scholar 

  9. Holland J. Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor, 1975

    Google Scholar 

  10. Lawrence Davis and al. Handbook of Genetic Algorithms. Lawrence Davis, 1991

    Google Scholar 

  11. Davidor Y. An Intuitive Introduction to Genetic Algorithms as Adaptative Optimizing Procedures. Weizmann Institute of Science, Technical Report CS90-07, 1990

    Google Scholar 

  12. Mé L. Algorithmes génétiques. SUPÉLEC, Rapport interne 93-001, 1993

    Google Scholar 

  13. Peng Y, Reggia J.E. A Probabilistic Causal Model for Diagnostic Problem Solving — Part 1: Integrating Symbolic Causal Inference with Numeric Probabilistic Inference. In: IEEE transaction on Systems, man and cybernetics, 1987; Vol. 17, N∘2

    Google Scholar 

  14. Garey M.R, Johnson D.S. Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman, 1979

    Google Scholar 

  15. Liepings G. E, Hilliard M. R, Richardson J, Palmer M. Genetic algorithms applications to set covering and traveling salesman problems. In: Operations Research and Artificial Intelligence: The Integration of Problem Solving Strategie, 1990

    Google Scholar 

  16. Liepins G.E, Potter W.D. A Genetic Algorithm Approach to Multiple-Fault Diagnosis. In: Handbook of genetic algorithms. Lawrence Davis, 1991

    Google Scholar 

  17. IBM. Elements of AIX Security. IBM Technical documentation GG24-3622-01, 1991

    Google Scholar 

  18. Mé L. Audit de sécurité. SUPÉLEC, Rapport interne 92-002, 1992

    Google Scholar 

  19. Alanou V, Mé L. Une Expérience d’audit de sécurité sous AIX R3.1. In: TRIBUNIX, 1992; Vol. 8, N∘43

    Google Scholar 

  20. U.S. Dep. of Defense. Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985

    Google Scholar 

  21. Alanou V, Mé L. Audit de sécurité : Deuxième partie. SUPÉLEC, Rapport interne 93-002, 1993

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag London Limited

About this paper

Cite this paper

Mé, L. (1993). Security Audit Trail Analysis Using Genetic Algorithms. In: Górski, J. (eds) SAFECOMP ’93. SAFECOMP 1993. Springer, London. https://doi.org/10.1007/978-1-4471-2061-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2061-2_32

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19838-3

  • Online ISBN: 978-1-4471-2061-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics