An Immunological Approach to Change Detection: Theoretical Results
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Learning program behavior profiles for intrusion detection
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Artificial immune system based on interval type-2 fuzzy set paradigm
Applied Soft Computing
Algorithms of non-self detector by negative selection principle in artificial immune system
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
A novel negative selection algorithm with an array of partial matching lengths for each detector
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
On permutation masks in hamming negative selection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
A comparative study on self-tolerant strategies for hardware immune systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Profiling network attacks via AIS
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
A new model for dynamic intrusion detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Information security risk assessment model for risk management
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
What have gene libraries done for AIS?
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
An adaptive self-tolerant algorithm for hardware immune system
ICES'05 Proceedings of the 6th international conference on Evolvable Systems: from Biology to Hardware
International Journal of Information Management: The Journal for Information Professionals
A comparative study of negative selection based anomaly detection in sequence data
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Relationships of swarm intelligence and artificial immune system
International Journal of Bio-Inspired Computation
Hi-index | 0.00 |
We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.