Learning using an artificial immune system
Journal of Network and Computer Applications - Special issue on intelligent systems: design and applications. Part 2
Coverage and Generalization in an Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
IEEE Security and Privacy
Architecture for an Artificial Immune System
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Hi-index | 0.01 |
The target of worm attacking is the whole internet; usually, the defense of worm intrusion based on single computer cannot work well when facing large scale of worms' attacking, so it cannot assure the network security all the time. Inspired by the collaboration of the immune cells, we apply the artificial immunology theory to the design of the active worm defense model AI-WDM, in which the computer network constitute an immune network and each computer in the network working as a detection node, they corporate with each other to defense the intrusion of worms while running detection processes independently.