Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Artificial Immune Systems: A New Computational Intelligence Paradigm
Artificial Immune Systems: A New Computational Intelligence Paradigm
On The Use Of Negative Selection In An Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
A comparative analysis of artificial immune network models
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Using the danger model of immune systems for distributed defense in modern data networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anomaly detection in TCP/IP networks using immune systems paradigm
Computer Communications
Revisiting LISYS: parameters and normal behavior
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Network anomaly detection with incomplete audit data
Computer Networks: The International Journal of Computer and Telecommunications Networking
Application areas of AIS: The past, the present and the future
Applied Soft Computing
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
Distributed agents model for intrusion detection based on AIS
Knowledge-Based Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Hi-index | 0.00 |
Technology and biological systems have now bi-directional relation that each benefits from the other. Biological systems naturally enjoy many attractive features and inherent intelligence that fit in solving many research problems. The natural immune system as one of those biological systems is considered a good source of inspiration to artificial defense systems. It has its own intelligent mechanisms to detect the foreign bodies and fight them and without it, an individual cannot live, even just for several days. The new types of network attacks evolved and became more complex, severe and hard to detect. This resulted in increasing need for network defense systems, and especially those with unordinary approaches or with ability to face the dynamic nature of new and continuously changing network threats. In this work we investigate different AIS theories and show how to combine different ideas to solve problems of network security domain. An Intrusion Detection System (IDS) that apply those ideas was built and tested in a real-time environment to test the pros and cons of Artificial Immune System (AIS) and clarify its applicability. Also some investigation on the vaccination biological process is introduced. A special module was built to perform this process and check its usage and how it could be formulated in artificial life.