Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining, but have been shown to scale poorly when applied to computer intrusion detection despite the fact that the biological immune system is a very effective anomaly detector. This may be because AIS algorithms have previously been based on the adaptive immune system and biologically-naive models. This paper focuses on describing and testing a more complex and biologically-authentic AIS model, inspired by the interactions between the innate and adaptive immune systems. Its performance on a realistic process anomaly detection problem is shown to be better than standard AIS methods (negative-selection), policy-based ano...
Thesis (MScEng (Process Engineering))--University of Stellenbosch, 2006.The natural immune system is...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
Artificial Immune Systems have been successfully applied to a number of problem domains including fa...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
This thesis explores the design and application of artificial immune systems (AISs), problem-solving...
The human immune system has numerous properties that make it ripe for exploitation in the computatio...
libtissue is a software system for implementing and testing AIS algorithms on real-world computer se...
Immune system is essential to human body as it protects our bodies from pathogens in an orchestrated...
Thesis (MScEng (Process Engineering))--University of Stellenbosch, 2006.The natural immune system is...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
Artificial Immune Systems have been successfully applied to a number of problem domains including fa...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
This thesis explores the design and application of artificial immune systems (AISs), problem-solving...
The human immune system has numerous properties that make it ripe for exploitation in the computatio...
libtissue is a software system for implementing and testing AIS algorithms on real-world computer se...
Immune system is essential to human body as it protects our bodies from pathogens in an orchestrated...
Thesis (MScEng (Process Engineering))--University of Stellenbosch, 2006.The natural immune system is...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...