Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Applying both positive and negative selection to supervised learning for anomaly detection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
A Comprehensive Overview of the Applications of Artificial Life
Artificial Life
A retrovirus inspired algorithm for virus detection & optimization
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Anomaly detection in TCP/IP networks using immune systems paradigm
Computer Communications
Revisiting Negative Selection Algorithms
Evolutionary Computation
Proceedings of the 9th annual conference companion on Genetic and evolutionary computation
Proceedings of the 9th annual conference on Genetic and evolutionary computation
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Social Science Computer Review
Computer defense using artificial intelligence
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Immune-Inspired Online Method for Service Interactions Detection
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
A cooperative control model for multiagent-based material handling systems
Expert Systems with Applications: An International Journal
Biologically-inspired distributed middleware management for stream processing systems
Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware
Information fusion for computer security: State of the art and open issues
Information Fusion
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
Intelligent agent based artificial immune system for computer security--a review
Artificial Intelligence Review
Fault diagnosis algorithm based on artificial immune mechanism
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Distributed architecture for intrusion detection system based on multi-softman
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
SAID: a self-adaptive intrusion detection system in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A worm detection model based on artificial immunology
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Improved identification of Hammerstein plants using new CPSO and IPSO algorithms
Expert Systems with Applications: An International Journal
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
Journal of Network and Computer Applications
Immunity-based model for malicious code detection
ICIC'10 Proceedings of the 6th international conference on Advanced intelligent computing theories and applications: intelligent computing
A nonself space approach to network anomaly detection
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
Expert Systems with Applications: An International Journal
A hybrid approach for learning concept hierarchy from Malay text using artificial immune network
Natural Computing: an international journal
Multiagent-based dendritic cell algorithm with applications in computer security
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Principles and methods of artificial immune system vaccination of learning systems
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Immune system inspired reliable query dissemination in wireless sensor networks
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Hybridization of immunological computation and fuzzy systems in surgery decision making
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part IV
A distributed surveillance model for network security inspired by immunology
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
A new model of immune-based network surveillance and dynamic computer forensics
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Detecting the web services feature interactions
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Grid intrusion detection based on immune agent
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Artificial immune systems applied to multiprocessor scheduling
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
An immune mobile agent based grid intrusion detection model
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
An immune-based model for computer virus detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A new model for dynamic intrusion detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Immunity and mobile agent based intrusion detection for grid
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Immunity and mobile agent based grid intrusion detection
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
A biological approach to autonomic communication systems
Transactions on Computational Systems Biology IV
An immune-based model for service survivability
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
A trojan detector generating algorithm based on chaotic theory
ICIC'11 Proceedings of the 7th international conference on Advanced Intelligent Computing
Application of immune algorithms on solving minimum-cost problem of water distribution network
Mathematical and Computer Modelling: An International Journal
Journal of Intelligent Manufacturing
An ecological approach to anomaly detection: the EIA model
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hybrid negative selection approach for anomaly detection
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Artificial immune system based mobile agent platform protection
Computer Standards & Interfaces
Improving energy efficiency in distributed intrusion detection systems
Journal of High Speed Networks
Hi-index | 0.00 |
With increased global interconnectivity and reliance on e-commerce, network services and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current anti-virus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral strains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture. A prototype interactive system is designed, implemented in Java and tested. The results validate the use of a distributed-agent biological system approach toward the computer security problems of virus elimination and ID