Abstract
We propose a security audit trail analysis approach based on predefined attack scenarios and using genetic algorithms. This paper shows the validity of this approach and presents some of its problems.
Pierre Rolin (Télécom Bretagne) supervises this PhD work.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Salz R. Computer Oracle and Password System (COPS). Internet Newsgroup Article (comp. sources.unix), 1990
Denning D.E. An Intrusion-Detection Model. IEEE transaction on Software Engineering 1987; Vol.13, N∘2
Debar H, Becker M, Siboni D. A Neural Network Component for an Intrusion Detection System. In: Proceedings of the IEEE Symposium of Research in Computer Security and Privacy, 1992
Lunt T.F, Tamaru A, Gilham F, Jagannathan R, Jalali C, Javitz H.S, Valdes A, Neumann P.G. A real-Time Intrusion-Detection Expert System. SRI International, Technical Report, 1990
Lunt T.F, Tamaru A, Gilham F, Jagannathan R, Neumann P.G, Jalali C. IDES: A Progress Report. In: Computer Security Application, Proceedings, 1990
GaryeyT.D, Lunt T.F. Model-based Intrusion Detection. In: Proceedings of the 14th National Computer Security Conference , 1991
Aho A.V: Algorithms for Finding Patterns in Strings. In: Handbook of Theoretical Computer Science. J. Van Leeuwen, 1990
Goldberg D.E. Genetic Algorithms in search, Optimization and Machine Learning. AddisonWesley, 1989
Holland J. Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor, 1975
Lawrence Davis and al. Handbook of Genetic Algorithms. Lawrence Davis, 1991
Davidor Y. An Intuitive Introduction to Genetic Algorithms as Adaptative Optimizing Procedures. Weizmann Institute of Science, Technical Report CS90-07, 1990
Mé L. Algorithmes génétiques. SUPÉLEC, Rapport interne 93-001, 1993
Peng Y, Reggia J.E. A Probabilistic Causal Model for Diagnostic Problem Solving — Part 1: Integrating Symbolic Causal Inference with Numeric Probabilistic Inference. In: IEEE transaction on Systems, man and cybernetics, 1987; Vol. 17, N∘2
Garey M.R, Johnson D.S. Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman, 1979
Liepings G. E, Hilliard M. R, Richardson J, Palmer M. Genetic algorithms applications to set covering and traveling salesman problems. In: Operations Research and Artificial Intelligence: The Integration of Problem Solving Strategie, 1990
Liepins G.E, Potter W.D. A Genetic Algorithm Approach to Multiple-Fault Diagnosis. In: Handbook of genetic algorithms. Lawrence Davis, 1991
IBM. Elements of AIX Security. IBM Technical documentation GG24-3622-01, 1991
Mé L. Audit de sécurité. SUPÉLEC, Rapport interne 92-002, 1992
Alanou V, Mé L. Une Expérience d’audit de sécurité sous AIX R3.1. In: TRIBUNIX, 1992; Vol. 8, N∘43
U.S. Dep. of Defense. Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985
Alanou V, Mé L. Audit de sécurité : Deuxième partie. SUPÉLEC, Rapport interne 93-002, 1993
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1993 Springer-Verlag London Limited
About this paper
Cite this paper
Mé, L. (1993). Security Audit Trail Analysis Using Genetic Algorithms. In: Górski, J. (eds) SAFECOMP ’93. SAFECOMP 1993. Springer, London. https://doi.org/10.1007/978-1-4471-2061-2_32
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2061-2_32
Published:
Publisher Name: Springer, London
Print ISBN: 978-3-540-19838-3
Online ISBN: 978-1-4471-2061-2
eBook Packages: Springer Book Archive