IEEE Spectrum
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
A short course on computer viruses (2nd ed.)
A short course on computer viruses (2nd ed.)
An introduction to Kolmogorov complexity and its applications (2nd ed.)
An introduction to Kolmogorov complexity and its applications (2nd ed.)
Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
Swarm intelligence: from natural to artificial systems
Swarm intelligence: from natural to artificial systems
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Simple, state-based approaches to program-based anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
On a Pattern-Oriented Model for Intrusion Detection
IEEE Transactions on Knowledge and Data Engineering
Design of a Visual Browser for Network Intrusion Detection
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
ICIIS '99 Proceedings of the 1999 International Conference on Information Intelligence and Systems
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Preventive and deterrent controls for software piracy
Journal of Management Information Systems
Intrusion detection using sequences of system calls
Journal of Computer Security
An immunological approach to change detection: algorithms, analysis and implications
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Intrusion and misuse detection in large-scale systems
IEEE Computer Graphics and Applications
Hi-index | 0.00 |
Information system availability is contingent on a robust security infrastructure that provides protection via preventive, detective, and corrective mechanisms. In this paper, we provide architecture inspired by biological metaphors from immunology and epidemiology for the security infrastructure of distributed information systems. The proposed architecture consists of an immunological model at the micro-level to detect and identify computer pathogens (e.g. viruses and worms), and an epidemiological model at the macro-level to identify distributed attacks.