Thesis (Ph.D.)--University of Hawaii at Manoa, 2008.The NetTRIIAD prototype demonstrates a reduction in false positive detections and an improvement in positive predictive value, compared to that of a conventional misuse-based intrusion detection system. The prototype also demonstrates the capacity to detect novel threats. These results support the thesis that the hybrid model can overcome some of the limitations of other intrusion detection approaches. This research points to the usefulness of immune-inspired approaches for problems in the domain of information system security, and represents a step toward providing an immune system for self-protecting information systems.This dissertation investigates a hybrid model for network threat det...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
INTRODUCTION\ud \ud In recent years computer systems have become increasingly complex and consequent...
In recent years computer systems have become increasingly complex and consequently the challenge of ...
The immune system is an impressive information processing system with many appealing properties for ...
In this paper we analyze Network Immunity as a bio-inspired approach for detecting anomalies in comm...
With the massive connectivity provided by modern computer networks, more and more systems are subjec...
Abstract:- With the massive connectivity provided by modern computer networks, more and more systems...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
It is believed that many of the mechanisms present in the biological immune system are well suited f...
The immune system provides an ideal metaphor for anomaly detection in general and computer securitie...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
INTRODUCTION\ud \ud In recent years computer systems have become increasingly complex and consequent...
In recent years computer systems have become increasingly complex and consequently the challenge of ...
The immune system is an impressive information processing system with many appealing properties for ...
In this paper we analyze Network Immunity as a bio-inspired approach for detecting anomalies in comm...
With the massive connectivity provided by modern computer networks, more and more systems are subjec...
Abstract:- With the massive connectivity provided by modern computer networks, more and more systems...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
It is believed that many of the mechanisms present in the biological immune system are well suited f...
The immune system provides an ideal metaphor for anomaly detection in general and computer securitie...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...