Research Article
Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment
Table 3
Detection results.
| Processes | ARTIS | IB-IDS | DR% | FAR% | DR% | FAR% |
| wu-ftpd | | | | | file name matching vulnerability | 76.12 (5.11) | 10.28 (4.17) | 96.55 (1.14) | 7.22 (1.22) | site exec vulnerability | 79.87 (2.45) | 9.87 (5.32) | 97.31 (1.23) | 6.65 (2.01) | attack of getting around access restrictions | 77.54 (4.77) | 12.75 (3.74) | 97.02 (1.08) | 7.43 (1.67) | sendmail | | | | | sccp attack | 74.52 (3.56) | 14.62 (3.41) | 98.11 (1.25) | 5.15 (1.63) | decode attack | 81.21 (4.84) | 15.72 (3.87) | 98.35 (1.01) | 5.42 (1.69) | remote buffer overflow attack | 82.45 (5.46) | 12.84 (5.63) | 98.78 (1.14) | 5.80 (1.28) | rootkit | | | | | simple hook rootkit | 85.15 (5.16) | 9.41 (4.12) | 99.99 (0) | 0 (0) | inline hook rootkit | 82.45 (6.82) | 10.75 (8.20) | 99.99 (0) | 0 (0) | inline hook complex rootkit | 75.14 (5.23) | 9.56 (6.77) | 95.84 (2.42) | 3.78 (2.89) |
|
|