Danger theory: the link between AIS and IDS?
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected th...
| Main Authors: | Aickelin, Uwe, Bentley, Peter, Cayzer, Steve, Kim, Jungwon, McLeod, Julie |
|---|---|
| Other Authors: | Timmis, Jon |
| Format: | Book Section |
| Published: |
Springer
2003
|
| Online Access: | https://eprints.nottingham.ac.uk/980/ |
Similar Items
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
A machine learning based AIS IDS.
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
An Artificial Immune System Based Recommender
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
A Recommender System based on the Immune Network
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
On the role of the AIS practitioner
by: Hart, Emma, et al.
Published: (2013)
by: Hart, Emma, et al.
Published: (2013)
MicroRNAs and intellectual disability (ID) in Down syndrome, X-linked ID and Fragile X syndrome
by: Siew, Wei Hong, et al.
Published: (2013)
by: Siew, Wei Hong, et al.
Published: (2013)
A Recommender System based on the Immune Network
by: Cayzer, S, et al.
Published: (2002)
by: Cayzer, S, et al.
Published: (2002)
Artificial immune systems (AIS) - a new paradigm for heuristic decision making
by: Aickelin, Uwe
Published: (2004)
by: Aickelin, Uwe
Published: (2004)
When a Bad Bias Can Be Good: Anxiety-Linked Attentional Bias to Threat in Contexts Where Dangers Can Be Avoided
by: Notebaert, L., et al.
Published: (2017)
by: Notebaert, L., et al.
Published: (2017)
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Dangerous Amphetamines
by: Abd Razak, Dzulkifli
Published: (1996)
by: Abd Razak, Dzulkifli
Published: (1996)
Danger theory metaphor in artificial immune system for system call data
by: Anjum Iqbal, Anjum Iqbal
Published: (2006)
by: Anjum Iqbal, Anjum Iqbal
Published: (2006)
The white-crowned black wheatear (Oenanthe leucopyga) in St. Katherine, Sinai: age related differences in territorial aggression and breeding success
by: McLeod, Luke
Published: (2014)
by: McLeod, Luke
Published: (2014)
Mimicking the behaviour of idiotypic AIS robot controllers using probabilistic systems
by: Whitbrook, Amanda, et al.
Published: (2009)
by: Whitbrook, Amanda, et al.
Published: (2009)
The use of probabilistic systems to mimic the behaviour of idiotypic AIS robot controllers
by: Whitbrook, Amanda, et al.
Published: (2009)
by: Whitbrook, Amanda, et al.
Published: (2009)
Dangers of fake dentists
by: Che Musa, Muhd Firdaus, et al.
Published: (2019)
by: Che Musa, Muhd Firdaus, et al.
Published: (2019)
Similar Items
-
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002) -
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002) -
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)