Communications of the ACM
Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Anomaly Detection Using Visualization and Machine Learning
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
A Multiagent Robot Language for Communication and Concurrency Control
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Architecture for an Artificial Immune System
Evolutionary Computation
Revisiting LISYS: parameters and normal behavior
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Experience with EMERALD to date
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Hi-index | 0.01 |
We design a network security system using an analogy of natural world immunology. We adopt an immune mechanism that distinguishes self or non-self and cooperation among immune cells of the system. This system implements each immune cell as an agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.