Integrating Innate and Adaptive Immunity for Intrusion Detection
Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a database of known attack signatures which are written...
| Main Authors: | Tedesco, Gianni, Twycross, Jamie, Aickelin, Uwe |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2006
|
| Online Access: | https://eprints.nottingham.ac.uk/579/ |
Similar Items
Experimenting with Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Libtissue - Implementing Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
HDL in innate and adaptive immunity
by: Catapano, A., et al.
Published: (2014)
by: Catapano, A., et al.
Published: (2014)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Information fusion in the immune system
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Innate and adaptive immune evasion by dengue virus
by: Lee, Michelle Felicia *, et al.
Published: (2022)
by: Lee, Michelle Felicia *, et al.
Published: (2022)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Real-time alert correlation with type graphs
by: Tedesco, Gianni, et al.
Published: (2008)
by: Tedesco, Gianni, et al.
Published: (2008)
Peculiarities of innate immune memory in crustaceans
by: Chen, Fei Low, et al.
Published: (2020)
by: Chen, Fei Low, et al.
Published: (2020)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Insights into innate and adaptive immune responses in vaccine development against EV-A71
by: Lim, Hui Xuan *, et al.
Published: (2019)
by: Lim, Hui Xuan *, et al.
Published: (2019)
No compensatory relationship between the innate and adaptive immune system in wild-living European badgers
by: Sin, Yung Wa, et al.
Published: (2016)
by: Sin, Yung Wa, et al.
Published: (2016)
Mammalian chitotriosidase and its role in innate immunity
by: Hall, Andrew J.
Published: (2009)
by: Hall, Andrew J.
Published: (2009)
Innate immune recognition of Neisseria meningitidis at the nasopharynx
by: Albiheyri, Raed
Published: (2016)
by: Albiheyri, Raed
Published: (2016)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
Characterisation of the Innate Immune Responses of Marron (Cherax cainii)
by: Prastowo, Bambang Widyo
Published: (2017)
by: Prastowo, Bambang Widyo
Published: (2017)
Stimulation of innate and adaptive immune cells with graphene oxide and reduced graphene oxide affect cancer progression
by: Yunus, Muhammad Amir, et al.
Published: (2021)
by: Yunus, Muhammad Amir, et al.
Published: (2021)
Similar Items
-
Experimenting with Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006) -
Libtissue - Implementing Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)