Testing automation for an intrusion detection system

Intrusion detection systems are used in computer networking and other applications to detect and respond to attempts to compromise computers, servers, firewalls and other network resources. As intrusion detection systems move beyond providing simple pattern recognition capabilities for known attack types, the ability to test these systems with conventional techniques (or use formal or other similar methods) becomes extremely limited. Environmental factors and other considerations present numerous scenarios that cannot be exhaustively identified, much less fully tested. This paper presents the use of an adaptive and automated testing paradigm to more fully validate intrusion detection systems that cannot be effectively fully tested by other means.

[1]  Walter D. Potter,et al.  A Blackboard-Based Learning Intrusion Detection System: A New Approach , 2003, IEA/AIE.

[2]  Gilbert Laporte,et al.  A Tabu Search Heuristic for the Vehicle Routing Problem , 1991 .

[3]  Rodney A. Brooks,et al.  Elephants don't play chess , 1990, Robotics Auton. Syst..

[4]  Radovan R. Bulatović,et al.  Cuckoo Search algorithm: A metaheuristic approach to solving the problem of optimum synthesis of a six-bar double dwell linkage , 2013 .

[5]  Rodney A. Brooks,et al.  Artificial Life and Real Robots , 1992 .

[6]  Fred Glover,et al.  Tabu Search: A Tutorial , 1990 .

[7]  Kenneth Morgan,et al.  Modified cuckoo search: A new gradient free optimisation algorithm , 2011 .

[8]  Bharti Suri,et al.  Analyzing test case selection & prioritization using ACO , 2011, SOEN.

[9]  Franz Wotawa,et al.  Debugging and test case generation using constraints and mutations , 2011, 2011 Proceedings of the Ninth International Workshop on Intelligent Solutions in Embedded Systems.

[10]  Jeremy Straub,et al.  A Characterization of the Utility of Using Artificial Intelligence to Test Two Artificial Intelligence Systems , 2013, Comput..

[11]  Paul C. Jorgensen,et al.  Software Testing: A Craftsman's Approach , 1995 .

[12]  Kerrie L. Mengersen,et al.  A proposed validation framework for expert elicited Bayesian Networks , 2013, Expert Syst. Appl..

[13]  Mark Harman,et al.  The role of Artificial Intelligence in Software Engineering , 2012, 2012 First International Workshop on Realizing AI Synergies in Software Engineering (RAISE).

[14]  Jeremy Straub,et al.  Consideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others , 2016 .

[15]  Hamed Shah-Hosseini,et al.  Problem solving by intelligent water drops , 2007, 2007 IEEE Congress on Evolutionary Computation.

[16]  Peng Dai,et al.  Artificial Intelligence for Artificial Artificial Intelligence , 2011, AAAI.

[17]  Jiang Wu,et al.  Novel intelligent water drops optimization approach to single UCAV smooth trajectory planning , 2009 .

[18]  B. Chandrasekaran On Evaluating Artificial Intelligence Systems for Medical Diagnosis , 1983, AI Mag..

[19]  Amir Hossein Gandomi,et al.  Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems , 2011, Engineering with Computers.

[20]  Jonathan Schaeffer,et al.  The challenge of poker , 2002, Artif. Intell..

[21]  Victor W. Marek,et al.  Computing with Default Logic , 1999, Artif. Intell..

[22]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[23]  Glenis Moore,et al.  The art of artificial intelligence , 1987 .

[24]  Rodney A. Brooks,et al.  Intelligence Without Reason , 1991, IJCAI.

[25]  Praveen Ranjan Srivastava,et al.  Test Case Optimization Using Artificial Bee Colony Algorithm , 2011, ACC.

[26]  F. Glover HEURISTICS FOR INTEGER PROGRAMMING USING SURROGATE CONSTRAINTS , 1977 .

[27]  Ioan Salomie,et al.  A Hybrid Firefly-inspired Approach for Optimal Semantic Web Service Composition , 2011, Scalable Comput. Pract. Exp..