Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
How to solve it: modern heuristics
How to solve it: modern heuristics
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Artficial Immune Systems and Their Applications
Artficial Immune Systems and Their Applications
Architecture for an Artificial Immune System
Evolutionary Computation
Intrusion detection using sequences of system calls
Journal of Computer Security
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
A retrovirus inspired algorithm for virus detection & optimization
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Learning DFA representations of HTTP for protecting web applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Towards an immunity-based system for detecting masqueraders
International Journal of Knowledge-based and Intelligent Engineering Systems
Different multi-objective evolutionary programming approaches for detecting computer network attacks
EMO'03 Proceedings of the 2nd international conference on Evolutionary multi-criterion optimization
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Towards an artificial immune system for online fraud detection
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
WCIS: a prototype for detecting zero-day attacks in web server requests
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Towards an immunity-based anomaly detection system for network traffic
International Journal of Knowledge-based and Intelligent Engineering Systems
Hi-index | 0.00 |
Intrusion/misuse detection is the top information assurance priority of both the national interagency INFOSEC Research Council and the Office of the Assistant Secretary of Defense. Traditional IDSs are effective at detecting known attacks; however, developing truly proactive defensive systems remains an open problem. This research investigates the feasibility of using evolutionary search techniques, in the context of a computer immune system, to detect computer network intrusions, with particular emphasis on developing techniques for catching new attacks. The system provided very low false-negative and false-positive error rates during initial experimentation.