Sensing Danger: Innate Immunology for Intrusion Detection

The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems wer...

Full description

Bibliographic Details
Main Authors: Aickelin, Uwe, Greensmith, Julie
Format: Article
Published: Elsevier 2007
Subjects:
Online Access:https://eprints.nottingham.ac.uk/392/
_version_ 1848790406656950272
author Aickelin, Uwe
Greensmith, Julie
author_facet Aickelin, Uwe
Greensmith, Julie
author_sort Aickelin, Uwe
building Nottingham Research Data Repository
collection Online Access
description The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms
first_indexed 2025-11-14T18:12:07Z
format Article
id nottingham-392
institution University of Nottingham Malaysia Campus
institution_category Local University
last_indexed 2025-11-14T18:12:07Z
publishDate 2007
publisher Elsevier
recordtype eprints
repository_type Digital Repository
spelling nottingham-3922020-05-04T20:28:37Z https://eprints.nottingham.ac.uk/392/ Sensing Danger: Innate Immunology for Intrusion Detection Aickelin, Uwe Greensmith, Julie The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms Elsevier 2007 Article PeerReviewed Aickelin, Uwe and Greensmith, Julie (2007) Sensing Danger: Innate Immunology for Intrusion Detection. Information Security Technical Report . ISSN 1363-4127 (In Press) immunology innate immunology intrusion detection http://www.elsevier.com/locate/istr
spellingShingle immunology
innate immunology
intrusion detection
Aickelin, Uwe
Greensmith, Julie
Sensing Danger: Innate Immunology for Intrusion Detection
title Sensing Danger: Innate Immunology for Intrusion Detection
title_full Sensing Danger: Innate Immunology for Intrusion Detection
title_fullStr Sensing Danger: Innate Immunology for Intrusion Detection
title_full_unstemmed Sensing Danger: Innate Immunology for Intrusion Detection
title_short Sensing Danger: Innate Immunology for Intrusion Detection
title_sort sensing danger: innate immunology for intrusion detection
topic immunology
innate immunology
intrusion detection
url https://eprints.nottingham.ac.uk/392/
https://eprints.nottingham.ac.uk/392/