Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
INTRODUCTION\ud \ud In recent years computer systems have become increasingly complex and consequent...
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover ...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
Copyright © 2014 Hua Yang et al.This is an open access article distributed under theCreativeCommonsA...
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the...
INTRODUCTION In recent years computer systems have become increasingly complex and consequently t...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
INTRODUCTION\ud \ud In recent years computer systems have become increasingly complex and consequent...
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover ...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
Copyright © 2014 Hua Yang et al.This is an open access article distributed under theCreativeCommonsA...
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the...
INTRODUCTION In recent years computer systems have become increasingly complex and consequently t...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
INTRODUCTION\ud \ud In recent years computer systems have become increasingly complex and consequent...
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover ...