Architecture for an Artificial Immune System
Evolutionary Computation
Anomalous system call detection
ACM Transactions on Information and System Security (TISSEC)
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Immune system approaches to intrusion detection --- a review
Natural Computing: an international journal
Information fusion for anomaly detection with the dendritic cell algorithm
Information Fusion
The application of a dendritic cell algorithm to a robotic classifier
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Towards a conceptual framework for innate immunity
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
HYBRID SIMULATION ALGORITHMS FOR AN AGENT-BASED MODEL OF THE IMMUNE RESPONSE
Cybernetics and Systems - BEST OF AGENT-BASED MODELING AND SIMULATION 2008
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
A danger theory inspired learning model and its application to spam detection
ICSI'11 Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part I
Structural design of the danger model immune algorithm
Information Sciences: an International Journal
Handling disruptions in manufacturing systems: An immune perspective
Engineering Applications of Artificial Intelligence
Towards an immunity-based anomaly detection system for network traffic
International Journal of Knowledge-based and Intelligent Engineering Systems
Hi-index | 0.00 |
The immune system provides an ideal metaphor for anomaly detection in general and computer securities in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune-inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real-world intrusion problems and show encouraging results. Overall, we believe that there is a bright future for these next-generation artificial immune algorithms.