Analysis of an intrusion detection system based on immunilogy
It is believed that many of the mechanism covered in the biological immune system are adapted to the field of computer intrusion detection within “LISYS�. In this report, I went briefly on the mechanisms of the biological immune system, their parallels in LISYS are presented, and how they may op...
| Main Author: | Saeed Al-Amoudi, Mohammed Hussein |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9502/ http://eprints.utm.my/9502/1/MohammedHusseinSaeedMFSKSM2008.pdf |
Similar Items
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
A static analysis approach for android permission-based malware detection systems
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Hot-based intrusion detection system (HIDS)
by: Zaid Affendi, Zainol
Published: (2005)
by: Zaid Affendi, Zainol
Published: (2005)
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023)
by: Shakirah, Saidin, et al.
Published: (2023)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
A new hybrid teaching learning based optimization -extreme learning machine model based intrusion-detection system
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023)
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023)
Review on Deep Learning-Based Face Analysis
by: Talab, Mohammed Ahmed, et al.
Published: (2018)
by: Talab, Mohammed Ahmed, et al.
Published: (2018)
Analysis of joint channel estimation and joint data detection in TD-SCDMA systems
by: Marzook, Ali K., et al.
Published: (2011)
by: Marzook, Ali K., et al.
Published: (2011)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Similar Items
-
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018) -
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017) -
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015) -
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011) -
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)