Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the dasiabotmaster of a botnetpsila. In this work, we use the biologically inspired dendritic cell algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspir...
Artificial immune systems have previously been applied to the prob-lem of intrusion detection. The a...
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hac...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Malicious users try to compromise systems using new techniques. One of the recent techniques used by...
The Dendritic Cell Algorithm (DCA) is inspired by the function of the dendritic cells of the human i...
Artificial immune systems, more specifically the negative selection algorithm, have previously been ...
The proliferation of cyber-attacks is accompanied by an urgent need to develop sophisticated detecti...
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of ano...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...
Abstract. The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this ...
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress th...
Over the past few years, IRC bots, malicious programs which are remotely controlled by the attacker,...
The use of artificial immune systems for investigation of cyber-security breaches is presented. Manu...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
Artificial immune systems have previously been applied to the prob-lem of intrusion detection. The a...
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hac...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Malicious users try to compromise systems using new techniques. One of the recent techniques used by...
The Dendritic Cell Algorithm (DCA) is inspired by the function of the dendritic cells of the human i...
Artificial immune systems, more specifically the negative selection algorithm, have previously been ...
The proliferation of cyber-attacks is accompanied by an urgent need to develop sophisticated detecti...
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of ano...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...
Abstract. The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this ...
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress th...
Over the past few years, IRC bots, malicious programs which are remotely controlled by the attacker,...
The use of artificial immune systems for investigation of cyber-security breaches is presented. Manu...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
Artificial immune systems have previously been applied to the prob-lem of intrusion detection. The a...
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hac...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...