Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Proceedings of the 2005 ACM symposium on Applied computing
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Applying both positive and negative selection to supervised learning for anomaly detection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
A Comprehensive Overview of the Applications of Artificial Life
Artificial Life
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
A retrovirus inspired algorithm for virus detection & optimization
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Immune anomaly detection enhanced with evolutionary paradigms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
To identify suspicious activity in anomaly detection based on soft computing
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
Anomaly detection in TCP/IP networks using immune systems paradigm
Computer Communications
Revisiting Negative Selection Algorithms
Evolutionary Computation
Proceedings of the 9th annual conference on Genetic and evolutionary computation
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Engineering Applications of Artificial Intelligence
Immuno-inspired autonomic system for cyber defense
Information Security Tech. Report
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
Combatting financial fraud: a coevolutionary anomaly detection approach
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Computer defense using artificial intelligence
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Immune-Inspired Online Method for Service Interactions Detection
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
An immune-genetic algorithm for introduction planning of new products
Computers and Industrial Engineering
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage
Information Sciences: an International Journal
An Expanded Lateral Interactive Clonal Selection Algorithm and Its Application
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Anti-virus security and robustness of heterogeneous immune static network
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Multiobjective classification with moGEP: an application in the network traffic domain
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism
FGIT '09 Proceedings of the 1st International Conference on Future Generation Information Technology
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
P2P-AIS: a P2P artificial immune systems architecture for detecting DDoS flooding attacks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Applying Kernel methods to anomaly based intrusion detection systems
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Expert Systems with Applications: An International Journal
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
A novel immune inspired approach to fault detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A worm detection model based on artificial immunology
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Association rules mining based on the improved immune algorithm
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A cooperative immunological approach for detecting network anomaly
Applied Soft Computing
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
A nonself space approach to network anomaly detection
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
Expert Systems with Applications: An International Journal
Towards efficient and effective negative selection algorithm: a convex hull representation scheme
SEAL'10 Proceedings of the 8th international conference on Simulated evolution and learning
A fusion of ICA and SVM for detection computer attacks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Architectures & infrastructure
Service research challenges and solutions for the future internet
Preemptive performance monitoring of a large network of Wi-Fi hotspots: an artificial immune system
WWIC'11 Proceedings of the 9th IFIP TC 6 international conference on Wired/wireless internet communications
A distributed surveillance model for network security inspired by immunology
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Research of immune intrusion detection algorithm based on semi-supervised clustering
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Artificial immune strategies improve the security of data storage
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Detecting the web services feature interactions
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Theoretical basis of novelty detection in time series using negative selection algorithms
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
A novel artificial immune network model and analysis on its dynamic behavior and stabilities
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
A new bio-inspired model for network security and its application
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A novel fuzzy anomaly detection method based on clonal selection clustering algorithm
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
An architecture for cloud computing and human immunity based network intrusion detection
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Anomaly intrusion detection based on PLS feature extraction and core vector machine
Knowledge-Based Systems
Hi-index | 0.00 |
This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In particular, the novel pattern detectors (in the complement space) are evolved using a genetic search, which could differentiate varying degrees of abnormality in network traffic. The paper demonstrates the usefulness of such a technique to detect a wide variety of intrusive activities on networked computers. We also used a positive characterization method based on a nearest-neighbor classification. Experiments are performed using intrusion detection data sets and tested for validation. Some results are reported along with analysis and concluding remarks