Communications of the ACM
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Real-time protocol analysis for detecting link-state routing protocol attacks
ACM Transactions on Information and System Security (TISSEC)
Deriving a concise description of non-self patterns in an aritificial immune system
New learning paradigms in soft computing
Simple, state-based approaches to program-based anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Intrusion Detection Using Variable-Length Audit Trail Patterns
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
A Real-Time Intrusion Detection System Based on Learning Program Behavior
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
A Biological Approach to the Development of Computer Autoimmune Systems
ISMIS '02 Proceedings of the 13th International Symposium on Foundations of Intelligent Systems
Towards a Model for an Immune System
MICAI '02 Proceedings of the Second Mexican International Conference on Artificial Intelligence: Advances in Artificial Intelligence
An Immunological Approach to Change Detection: Theoretical Results
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Complexity - Special issue: Resilient and adaptive defense of computing networks
Configurable immunity for evolving human-computer systems
Science of Computer Programming - Methods of software design: Techniques and applications
Hybrid detector set: detectors with different affinity
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
The application of antigenic search techniques to time series forecasting
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An innate immune system for the protection of computer networks
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Architecture for an Artificial Immune System
Evolutionary Computation
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
A control theory perspective on configuration management and Cfengine
ACM SIGBED Review
Probabilistic anomaly detection in distributed computer networks
Science of Computer Programming
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
Engineering Applications of Artificial Intelligence
Revisiting Negative Selection Algorithms
Evolutionary Computation
Multi-class iteratively refined negative selection classifier
Applied Soft Computing
Congestion Control in the Internet: Inspiration from Balanced Food Chains in the Nature
Journal of Network and Systems Management
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Study of Immune Control Computing in Immune Detection Algorithm for Information Security
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence
ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION
Cybernetics and Systems
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
An Immune Multi-agent System for Network Intrusion Detection
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage
Information Sciences: an International Journal
Immune K-means and negative selection algorithms for data analysis
Information Sciences: an International Journal
ACM Computing Surveys (CSUR)
On average time complexity of evolutionary negative selection algorithms for anomaly detection
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Foundations of r-contiguous matching in negative selection for anomaly detection
Natural Computing: an international journal
An Error Propagation Algorithm for Ad Hoc Wireless Networks
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Optimization of software testing using genetic algorithms
MACMESE'09 Proceedings of the 11th WSEAS international conference on Mathematical and computational methods in science and engineering
Research on linear time detector generating algorithm based on negative selection model
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
P2P-AIS: a P2P artificial immune systems architecture for detecting DDoS flooding attacks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Applying Kernel methods to anomaly based intrusion detection systems
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Hybrid detector based negative selection algorithm
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
MILA: multilevel immune learning algorithm
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Artificial immune system programming for symbolic regression
EuroGP'03 Proceedings of the 6th European conference on Genetic programming
Learning user preferences for multi-attribute negotiation: an evolutionary approach
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
Novel immune-based framework for securing ad hoc networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Phase transition and the computational complexity of generating r-contiguous detectors
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A novel fast negative selection algorithm enhanced by state graphs
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Collaborative RFID intrusion detection with an artificial immune system
Journal of Intelligent Information Systems
Negative selection algorithms on strings with efficient training and linear-time classification
Theoretical Computer Science
Towards efficient and effective negative selection algorithm: a convex hull representation scheme
SEAL'10 Proceedings of the 8th international conference on Simulated evolution and learning
Hi-index | 0.02 |
We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.