'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system....
| Main Authors: | Kim, Jungwon, Greensmith, Julie, Twycross, Jamie, Aickelin, Uwe |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Online Access: | https://eprints.nottingham.ac.uk/302/ |
Similar Items
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Integrating Innate and Adaptive Immunity for Intrusion Detection
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Experimenting with Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Information fusion in the immune system
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Libtissue - Implementing Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Articulation and Clarification of the Dendric Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Detecting danger in roads: an immune-inspired technique to identify heavy goods vehicles incident hot spots
by: Figueredo, Grazziela P., et al.
Published: (2017)
by: Figueredo, Grazziela P., et al.
Published: (2017)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Similar Items
-
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005) -
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004) -
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004) -
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)