Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used...
| Main Authors: | Kim, Jungwon, Bentley, Peter, Aickelin, Uwe, Greensmith, Julie, Tedesco, Gianni, Twycross, Jamie |
|---|---|
| Format: | Article |
| Published: |
Springer
2007
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/571/ |
Similar Items
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Integrating Innate and Adaptive Immunity for Intrusion Detection
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An Immunology-inspired Multi-engine Anomaly Detection System with Hybrid Particle Swarm Optimisations
by: Jiang, F., et al.
Published: (2012)
by: Jiang, F., et al.
Published: (2012)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
On the role of the AIS practitioner
by: Hart, Emma, et al.
Published: (2013)
by: Hart, Emma, et al.
Published: (2013)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Translating simulation approaches for immunology
by: Figueredo, Grazziela P.
Published: (2012)
by: Figueredo, Grazziela P.
Published: (2012)
Exploiting the plasticity of primary and secondary response mechanisms in artificial immune systems
by: Greensmith, Julie, et al.
Published: (2016)
by: Greensmith, Julie, et al.
Published: (2016)
Idiotypic Immune Networks in Mobile Robot Control
by: Whitbrook, Amanda, et al.
Published: (2007)
by: Whitbrook, Amanda, et al.
Published: (2007)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Development of a Saltwater Intrusion Software Using Visual Basic
by: Tan, Chiau Siang
Published: (2001)
by: Tan, Chiau Siang
Published: (2001)
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
by: Mat Yunos, Aziz Kasmir
Published: (2006)
by: Mat Yunos, Aziz Kasmir
Published: (2006)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Similar Items
-
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007) -
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010) -
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003) -
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)