Research Article

An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection

Table 8

Experimental result.

Mode attackedGIDA (bytes) (bytes)
Time (s)

Changing password670.2410.13020061980
900.3010.091
1030.4090.041
Setting SUID bit of script1100.2040.350387995387995
1780.5690.203
Changing key files signed by user890.0170.2551412
1250.0460.148
1790.0870.097
Changing master computer’s log files580.1040.06223511869
860.3120.010
Probing attack/insweep/portsweep1150.1100.033346577346577
1500.0870.0240
DOS attack/back/Neptune1080.1210.051346577346577
1400.1010.044