State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Classification and detection of computer intrusions
Classification and detection of computer intrusions
An introduction to intrusion detection
Crossroads - Special issue on computer security
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
In recent year, we have seen a growing interest in computational methods based upon natural phenomena with biologically inspired techniques, such as cellular automata, immune human systems, neural networks, DNA and molecular computing. Some of these solution techniques are classified under the realm of a general paradigm, called biocomputing. In this paper, we propose a security system for fraud detection of intruders and improper use of computer system operations. Our technique is based upon data analysis inspired by the natural immune human system. This paper shows how immune metaphors can be used efficiently to tackle the computer system security problem.