This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user’s command sequences on UNIX-like s...
Daily access to Internet, increase in number of users, and newly discovered violations of policies, ...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
Abstract — We have witnessed the release of multiple viruses and worms in a few years. Some of these...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
Previous research in supervised and unsupervised anomaly detection normally employ a static model of...
Artificial Immune Systems are inspired by biological immune systems, and are characterized by intere...
In this paper, a method for anomaly detection is described which is based on principles of the natur...
We present a cooperative intrusion detection approach inspired by biological immune system principle...
Artificial Immune System (AIS) over the years has caught attention of researchers of various domains...
Abstract:- Originated from human immune system, artificial immune system has been widely applied in ...
Results of an experimental study of an anomaly detec-tion system based on the paradigm of artificial...
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
Abstract—We present a cooperative intrusion detection ap-proach inspired by biological immune system...
Artificial Immune Systems have been successfully applied to a number of problem domains including fa...
Daily access to Internet, increase in number of users, and newly discovered violations of policies, ...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
Abstract — We have witnessed the release of multiple viruses and worms in a few years. Some of these...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
Previous research in supervised and unsupervised anomaly detection normally employ a static model of...
Artificial Immune Systems are inspired by biological immune systems, and are characterized by intere...
In this paper, a method for anomaly detection is described which is based on principles of the natur...
We present a cooperative intrusion detection approach inspired by biological immune system principle...
Artificial Immune System (AIS) over the years has caught attention of researchers of various domains...
Abstract:- Originated from human immune system, artificial immune system has been widely applied in ...
Results of an experimental study of an anomaly detec-tion system based on the paradigm of artificial...
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field...
Two of the major approaches to intrusion detection are anomaly-based detection and signature-based d...
Abstract—We present a cooperative intrusion detection ap-proach inspired by biological immune system...
Artificial Immune Systems have been successfully applied to a number of problem domains including fa...
Daily access to Internet, increase in number of users, and newly discovered violations of policies, ...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
Abstract — We have witnessed the release of multiple viruses and worms in a few years. Some of these...