Communications of the ACM
Hacking Exposed Windows 2000: Network Security Secrets and Solutions
Hacking Exposed Windows 2000: Network Security Secrets and Solutions
Immunotronics: Hardware Fault Tolerance Inspired by the Immune System
ICES '00 Proceedings of the Third International Conference on Evolvable Systems: From Biology to Hardware
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A study of artificial immune systems applied to anomaly detection
A study of artificial immune systems applied to anomaly detection
Storage-based intrusion detection: watching storage activity for suspicious behavior
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
MILA: multilevel immune learning algorithm
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Hi-index | 0.00 |
Storage-based intrusion detection systems (SIDS) allow storage systems to watch for suspicious activity. This paper presents a novel storage- based intrusion detection scheme to monitor the user's activities with the artificial immune technique. Compared with the previous SIDS prototype, the SIDS using artificial immune technique can recognize a strange suspicious behavior. Before simulation, a set of appropriate parameters of algorithm are fitted according to the mean convergence speed and detection efficiency. The simulation shows the proposed scheme can reach higher detection rate and lower false alarm rate than the previous ones.