Research Article

Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

Table 3

Detection results.

ProcessesARTISIB-IDS
DR%FAR%DR%FAR%

wu-ftpd
 file name matching vulnerability76.12 (5.11)10.28 (4.17)96.55 (1.14)7.22 (1.22)
 site exec vulnerability79.87 (2.45)9.87 (5.32)97.31 (1.23)6.65 (2.01)
 attack of getting around access restrictions77.54 (4.77)12.75 (3.74)97.02 (1.08)7.43 (1.67)
sendmail
 sccp attack74.52 (3.56)14.62 (3.41)98.11 (1.25)5.15 (1.63)
 decode attack81.21 (4.84)15.72 (3.87)98.35 (1.01)5.42 (1.69)
 remote buffer overflow attack82.45 (5.46)12.84 (5.63)98.78 (1.14)5.80 (1.28)
rootkit
 simple hook rootkit85.15 (5.16)9.41 (4.12)99.99 (0)0 (0)
 inline hook rootkit82.45 (6.82)10.75 (8.20)99.99 (0)0 (0)
 inline hook complex rootkit75.14 (5.23)9.56 (6.77)95.84 (2.42)3.78 (2.89)