Research Article
An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection
| Mode attacked | GIDA | (bytes) | (bytes) | | Time (s) | |
| Changing password | 67 | 0.241 | 0.130 | 2006 | 1980 | 90 | 0.301 | 0.091 | 103 | 0.409 | 0.041 | Setting SUID bit of script | 110 | 0.204 | 0.350 | 387995 | 387995 | 178 | 0.569 | 0.203 | Changing key files signed by user | 89 | 0.017 | 0.255 | 14 | 12 | 125 | 0.046 | 0.148 | 179 | 0.087 | 0.097 | Changing master computer’s log files | 58 | 0.104 | 0.062 | 2351 | 1869 | 86 | 0.312 | 0.010 | Probing attack/insweep/portsweep | 115 | 0.110 | 0.033 | 346577 | 346577 | 150 | 0.087 | 0.0240 | DOS attack/back/Neptune | 108 | 0.121 | 0.051 | 346577 | 346577 | 140 | 0.101 | 0.044 |
|
|