Biological Intrusion Prevention and Self-Healing Model for Network Security
This paper describes a new approach for network security based on the combination of biological intrusion prevention and self-healing concepts. The presented system integrates an artificial immune intrusion prevention system for network security inspired by immunological theory known as danger theor...
| Main Authors: | Muna, Elsadig, Azween, Abdullah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/2591/ http://scholars.utp.edu.my/id/eprint/2591/1/ICCNT2009.pdf |
Similar Items
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Immune Multi Agent System for Intrusion Prevention and Self healing System Implement a Non-Linear Classification
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
A Biologically Based Self-Healing Wireless Sensor Network
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
by: Vasaki , Ponnusamy, et al.
Published: (2010)
by: Vasaki , Ponnusamy, et al.
Published: (2010)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Layered biologically inspired self-healing software system architecture
by: Azween, Abdullah, et al.
Published: (2008)
by: Azween, Abdullah, et al.
Published: (2008)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Multi-Tiered Bio-Inspired Self-Healing Architectural
Paradigm for Software Systems
by: Azween, Abdullah, et al.
Published: (2009)
by: Azween, Abdullah, et al.
Published: (2009)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Biologically-Inspired Modeling of Filtering Noise in Signal Sound
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
A Proposed Model of Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
Biologically-Inspired Abstraction Model to Analyze Sound Signal
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
A Proposed Biologically-Inspired Model to Analyze Signal Sound
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer, Irwan, et al.
Published: (2009)
by: Hammuzamer, Irwan, et al.
Published: (2009)
A New Abstraction Model for Biologically- Inspired Sound Signal Analyzer
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
A Proposed Biologically Inspired Model for Object Recognition
by: Hamada , R. H. Al-Absi, et al.
Published: (2009)
by: Hamada , R. H. Al-Absi, et al.
Published: (2009)
Similar Items
-
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009) -
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al. -
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010) -
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
by: Muna, Elsadig, et al.
Published: (2010) -
Immune Multi Agent System for Intrusion Prevention and Self healing System Implement a Non-Linear Classification
by: Muna, Elsadig, et al.
Published: (2010)