Induction: processes of inference, learning, and discovery
Induction: processes of inference, learning, and discovery
Adaptation in natural and artificial systems
Adaptation in natural and artificial systems
NADIR: an automated system for detecting network intrusion and misuse
Computers and Security
Communications of the ACM
DNS and BIND
Catching Ourselves in the Act: Situated Activity, Interactive Emergence, Evolution, and Human Thought
NetSTAT: A Network-Based Intrusion Detection Approach
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
An Immunological Approach to Change Detection: Theoretical Results
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Building Diverse Computer Systems
HOTOS '97 Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Intrusion detection using sequences of system calls
Journal of Computer Security
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
Proceedings of the 2001 workshop on New security paradigms
Enabling automatic adaptation in systems with under-specified elements
WOSS '02 Proceedings of the first workshop on Self-healing systems
A Middleware for Large Scale Networks Inspired by the Immune System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
What Is a Learning Classifier System?
Learning Classifier Systems, From Foundations to Applications
Towards a Model for an Immune System
MICAI '02 Proceedings of the Second Mexican International Conference on Artificial Intelligence: Advances in Artificial Intelligence
Recent trends in learning classifier systems research
Advances in evolutionary computing
Genetic Programming and Evolvable Machines
Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Learning Algorithm
Genetic Programming and Evolvable Machines
Immune Memory and Gene Library Evolution in the Dynamic Clonal Selection Algorithm
Genetic Programming and Evolvable Machines
Security in an autonomic computing environment
IBM Systems Journal
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
On the contribution of gene libraries to artificial immune systems
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An innate immune system for the protection of computer networks
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
A retrovirus inspired algorithm for virus detection & optimization
Proceedings of the 8th annual conference on Genetic and evolutionary computation
An artificial immune system and its integration into an organic middleware for self-protection
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Description of bad-signatures for network intrusion detection
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Analyzing and evaluating dynamics in stide performance for intrusion detection
Knowledge-Based Systems
Field review: Complex systems: Network thinking
Artificial Intelligence
Learning DFA representations of HTTP for protecting web applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Using the danger model of immune systems for distributed defense in modern data networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anomaly detection in TCP/IP networks using immune systems paradigm
Computer Communications
Applying biological principles to designs of network services
Applied Soft Computing
Revisiting Negative Selection Algorithms
Evolutionary Computation
Negative selection based immune optimization
Advances in Engineering Software
Extended thymus action for reducing false positives in ais based network intrusion detection systems
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Cancer outcome prediction by cluster-based artificial immune networks
BIEN '07 Proceedings of the fifth IASTED International Conference: biomedical engineering
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection
Information Security Tech. Report
Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
Immune-inspired incremental feature selection technology to data streams
Applied Soft Computing
Adaptive e-mail intention finding mechanism based on e-mail words social networks
Proceedings of the 2007 workshop on Large scale attack defense
Integrated platform of artificial immune system for anomaly detection
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
Attack analysis & bio-inspired security framework for IPMultimedia subsystem
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
Attack analysis & bio-inspired security framework for IP multimedia subsystem
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Selection for group-level efficiency leads to self-regulation of population size
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Theoretical advances in artificial immune systems
Theoretical Computer Science
Artificial Immunity-Based Discovery for Popular Information in WEB Pages
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Information Theory Inspired Weighted Immune Classification Algorithm
ICAISC '08 Proceedings of the 9th international conference on Artificial Intelligence and Soft Computing
Social Layers in Agents' Behavior Evaluation System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
A Hybrid Model for Immune Inspired Network Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Negative Selection with Antigen Feedback in Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Computational Models of Emergent Properties
Minds and Machines
Hiding a Needle in a Haystack Using Negative Databases
Information Hiding
Bio-Inspired Computing and Communication
Distributed agents model for intrusion detection based on AIS
Knowledge-Based Systems
Monitoring smartphones for anomaly detection
Mobile Networks and Applications
An Immune Multi-agent System for Network Intrusion Detection
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
Agent-based modeling of host-pathogen systems: The successes and challenges
Information Sciences: an International Journal
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
An Improved Clonal Selection Algorithm and Its Application to Traveling Salesman Problems
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Autopoiesis, the immune system, and adaptive information filtering
Natural Computing: an international journal
Facilitating evolutionary innovation by developmental modularity and variability
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Information fusion for anomaly detection with the dendritic cell algorithm
Information Fusion
An Immunity Inspired Real-Time Cooperative Control Framework for Networked Multi-agent Systems
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
An artificial immune system based sensor network for frost warning and prevention
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
P2P-AIS: a P2P artificial immune systems architecture for detecting DDoS flooding attacks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Dynamical immunological surveillance for network danger evaluation model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A taxonomy of biologically inspired research in computer networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey on bio-inspired networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Using an immune system model to explore mate selection in genetic algorithms
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Design and implementation of security system based on immune system
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Developmental models for emergent computation
ICES'03 Proceedings of the 5th international conference on Evolvable systems: from biology to hardware
Defence against 802.11 dos attacks using artificial immune system
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A computational model for the cognitive immune system theory based on learning classifier systems
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Research of immune neural network model based on extenics
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
Decentralized detector generation in cooperative intrusion detection systems
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
A worm detection model based on artificial immunology
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Expert Systems with Applications: An International Journal
A Survey of artificial immune applications
Artificial Intelligence Review
A review of evolutionary and immune-inspired information filtering
Natural Computing: an international journal
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
Enhancing efficiency of intrusion prediction based on intelligent immune method
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Bio-inspired networking: from theory to practice
IEEE Communications Magazine
Collaborative RFID intrusion detection with an artificial immune system
Journal of Intelligent Information Systems
A granular agent evolutionary algorithm for classification
Applied Soft Computing
Artificial immune system based on interval type-2 fuzzy set paradigm
Applied Soft Computing
Policy controlled self-configuration in unattended wireless sensor networks
Journal of Network and Computer Applications
Proceedings of the 2010 Conference on Grand Challenges in Modeling & Simulation
Research of adaptive immune network intrusion detection model
International Journal of Systems, Control and Communications
Stochastic search with locally clustered targets: learning from T cells
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Immune system inspired reliable query dissemination in wireless sensor networks
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Towards a mapping of modern AIS and LCS
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Towards an artificial immune system for online fraud detection
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
A review of clonal selection algorithm and its applications
Artificial Intelligence Review
A distributed surveillance model for network security inspired by immunology
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
A new model of immune-based network surveillance and dynamic computer forensics
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
HMMs for anomaly intrusion detection
CIS'04 Proceedings of the First international conference on Computational and Information Science
On permutation masks in hamming negative selection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Immune algorithm optimization of membership functions for mining association rules
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Profiling network attacks via AIS
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
Heterogeneous behavior evaluations in ethically–social approach to security in multi-agent system
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
An immune-based model for computer virus detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A new model for dynamic intrusion detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An immunological approach to raising alarms in video surveillance
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
An immunity-based dynamic multilayer intrusion detection system
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
A bio-inspired approach for self-protecting an organic middleware with artificial antibodies
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
USAID: unifying signature-based and anomaly-based intrusion detection
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Intrusion detection based on immune clonal selection algorithms
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
An AIS-based dynamic routing (AISDR) framework
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Self-regulating method for model library based artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
On leveraging stochastic models for remote attestation
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
WCIS: a prototype for detecting zero-day attacks in web server requests
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
R&D: Using danger to distribute defences
Infosecurity
Autonomous recovery from hostile code insertion using distributed reflection
Cognitive Systems Research
Journal of Intelligent Manufacturing
A pattern-driven framework for monitoring security and dependability
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Computers and Industrial Engineering
Hybrid negative selection approach for anomaly detection
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Application of the feature-detection rule to the Negative Selection Algorithm
Expert Systems with Applications: An International Journal
Robotics and Computer-Integrated Manufacturing
Engineering Applications of Artificial Intelligence
On the equivalences and differences of evolutionary algorithms
Engineering Applications of Artificial Intelligence
Genetic optimized artificial immune system in spam detection: a review and a model
Artificial Intelligence Review
Hi-index | 0.01 |
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynamic learning and adaptation, and self-monitoring. ARTIS is a general framework for a distributed adaptive system and could, in principle, be applied to many domains. In this paper, ARTIS is applied to computer security in the form of a network intrusion detection system called LISYS. LISYS is described and shown to be effective at detecting intrusions, while maintaining low false positive rates. Finally, similarities and differences between ARTIS and Holland's classifier systems are discussed.