Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used...
| Main Authors: | Kim, Jungwon, Bentley, Peter, Aickelin, Uwe, Greensmith, Julie, Tedesco, Gianni, Twycross, Jamie |
|---|---|
| Format: | Article |
| Published: |
Springer
2007
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/659/ |
Similar Items
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
On the role of the AIS practitioner
by: Hart, Emma, et al.
Published: (2013)
by: Hart, Emma, et al.
Published: (2013)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
Integrating Innate and Adaptive Immunity for Intrusion Detection
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Exploiting the plasticity of primary and secondary response mechanisms in artificial immune systems
by: Greensmith, Julie, et al.
Published: (2016)
by: Greensmith, Julie, et al.
Published: (2016)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Idiotypic Immune Networks in Mobile Robot Control
by: Whitbrook, Amanda, et al.
Published: (2007)
by: Whitbrook, Amanda, et al.
Published: (2007)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
The use of agent-based simulation to discover extreme cases in immune-interactions with early-stage cancer scenarios
by: Figueredo, Grazziela P., et al.
Published: (2013)
by: Figueredo, Grazziela P., et al.
Published: (2013)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Development of paraplegic quadriceps muscle models using artificial intelligent techniques / Syafinas Mohd Salleh
by: Mohd Salleh, Syafinas
Published: (2015)
by: Mohd Salleh, Syafinas
Published: (2015)
Artificial Immune Tissue using Self-Organizing Networks
by: Feyereisl, J, et al.
Published: (2006)
by: Feyereisl, J, et al.
Published: (2006)
Artificial Immune Tissue using Self-Organizing Networks
by: Feyereisl, J, et al.
Published: (2006)
by: Feyereisl, J, et al.
Published: (2006)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Forecasting the price fresh fruit bunch using artificial neural network in East Coast of Malaysia / Muhammad Ikhwan Syazwan Mohd Fazdli
by: Mohd Fazdli, Muhammad Ikhwan Syazwan
Published: (2019)
by: Mohd Fazdli, Muhammad Ikhwan Syazwan
Published: (2019)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
by: Mat Yunos, Aziz Kasmir
Published: (2006)
by: Mat Yunos, Aziz Kasmir
Published: (2006)
Similar Items
-
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010) -
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003) -
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007) -
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)