Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
Rule generalisation in intrusion detection systems using SNORT
International Journal of Electronic Security and Digital Forensics
Immunological inspiration for building a new generation of autonomic systems
Proceedings of the 1st international conference on Autonomic computing and communication systems
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
Denial of service detection and analysis using idiotypic networks paradigm
Proceedings of the 10th annual conference on Genetic and evolutionary computation
A Hybrid Model for Immune Inspired Network Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Immune Systems and Computation: An Interdisciplinary Adventure
UC '08 Proceedings of the 7th international conference on Unconventional Computing
A negative selection algorithm for classification and reduction of the noise effect
Applied Soft Computing
Soft Computing Techniques for Internet Backbone Traffic Anomaly Detection
EvoWorkshops '09 Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG
Artificial neural network approaches to intrusion detection: a review
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Nonself Detection in a Two-Component Cellular Frustrated System
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Application of artificial neural network in detection of DOS attacks
Proceedings of the 2nd international conference on Security of information and networks
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Intelligent agent based artificial immune system for computer security--a review
Artificial Intelligence Review
A taxonomy of biologically inspired research in computer networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards a novel immune inspired approach to temporal anomaly detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A differential coefficient inspired method for malicious software detection
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Intrusion Detection by Ellipsoid Boundary
Journal of Network and Systems Management
A model of collaborative artificial immune system
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Evaluations for immunity-based anomaly detection with dynamic updating of profiles
Artificial Life and Robotics
A new distributed intrusion detection method based on immune mobile agent
LSMS/ICSEE'10 Proceedings of the 2010 international conference on Life system modeling and and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part I
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
A hybrid AIS-SVM ensemble approach for text classification
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
Tunable immune detectors for behaviour-based network intrusion detection
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
A study of nature-inspired methods for financial trend reversal detection
EvoCOMNET'10 Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part II
Artificial Immune Systems: Models, Applications, and challenges
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Dynamic adaptive search based software engineering
Proceedings of the ACM-IEEE international symposium on Empirical software engineering and measurement
Bait a trap: introducing natural killer cells to artificial immune system for spyware detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
A negative selection approach to intrusion detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Automatic security assessment for next generation wireless mobile networks
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Towards an immunity-based anomaly detection system for network traffic
International Journal of Knowledge-based and Intelligent Engineering Systems
Hi-index | 0.00 |
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. First, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Second, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.