메뉴 건너뛰기




Volumn 13, Issue 2, 2005, Pages 179-212

A machine learning evaluation of an artificial immune system

Author keywords

Anomaly detection; Artificial immune systems; Computer security; Immune system; Machine learning; Network intrusion detection

Indexed keywords

ANOMALY DETECTION; ARTIFICIAL IMMUNE SYSTEMS; IMMUNE SYSTEMS; NETWORK INTRUSION DETECTION;

EID: 21244441082     PISSN: 10636560     EISSN: None     Source Type: Journal    
DOI: 10.1162/1063656054088503     Document Type: Article
Times cited : (51)

References (50)
  • 1
    • 17444401173 scopus 로고    scopus 로고
    • Extending the computer defense immune system: Network intrusion detection with a multiobjective evolutionary programming approach
    • Timmis, J. and Bentley, P. J., editors University of Kent at Canterbury. University of Kent at Canterbury Printing Unit
    • Anchor, K. P., Zydallis, J. B., Hunch, G. H., and Lamont, G. B. (2002). Extending the computer defense immune system: Network intrusion detection with a multiobjective evolutionary programming approach. In Timmis, J. and Bentley, P. J., editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pages 12-21, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit.
    • (2002) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) , pp. 12-21
    • Anchor, K.P.1    Zydallis, J.B.2    Hunch, G.H.3    Lamont, G.B.4
  • 2
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system (nides): A summary
    • Computer Science Laboratory, SRI International, Menlo Park, CA
    • Anderson, D., Frivold, T., and Valdes, A. (1995). Next-generation intrusion detection expert system (nides): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA.
    • (1995) Technical Report , vol.SRI-CSL-95-07
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 3
    • 0000106131 scopus 로고
    • Inductive inference of formal languages from positive data
    • Angluin, D. (1980). Inductive inference of formal languages from positive data. Information and Control, 45(2):117-135.
    • (1980) Information and Control , vol.45 , Issue.2 , pp. 117-135
    • Angluin, D.1
  • 4
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S. (2000). The base-rate fallacy and the difficulty of intrusion detection. ACM. Transactions on Information and System Security, 3(3):186-205.
    • (2000) ACM. Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 9
    • 0001809076 scopus 로고
    • Representation and hidden bias: Gray vs. binary coding for genetic algorithms
    • Morgan Kaufmann
    • Caruana, R. A. and Schaffer, J. D. (1988). Representation and hidden bias: Gray vs. binary coding for genetic algorithms. In MACHLERN5. Morgan Kaufmann.
    • (1988) MACHLERN5
    • Caruana, R.A.1    Schaffer, J.D.2
  • 11
    • 21244449953 scopus 로고    scopus 로고
    • Personal Communication
    • Chao, D. (2001). Personal Communication.
    • (2001)
    • Chao, D.1
  • 13
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • Dasgupta, D. and Gonzalez, F. (2002). An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):1081-1088.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 1081-1088
    • Dasgupta, D.1    Gonzalez, F.2
  • 14
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Debar, H., Dacier, M., and Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8):361-378.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 20
    • 49949150022 scopus 로고
    • Language identification in the limit
    • Gold, E. (1967). Language identification in the limit. Information and Control, 10:447-474.
    • (1967) Information and Control , vol.10 , pp. 447-474
    • Gold, E.1
  • 23
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Helman, P. and Liepins, G. (1993). Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9):886-901.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 24
    • 0002896413 scopus 로고
    • Tracking drifting concepts by minimizing disagreements
    • Helmbold, D. P. and Long, P. M. (1991). TRACKING DRIFTING CONCEPTS BY MINIMIZING DISAGREEMENTS. Machine Learning, 14:27-45.
    • (1991) Machine Learning , vol.14 , pp. 27-45
    • Helmbold, D.P.1    Long, P.M.2
  • 26
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S. and Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation Journal, 8(4):443-473.
    • (2000) Evolutionary Computation Journal , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 28
    • 0013325562 scopus 로고    scopus 로고
    • Internet Security Systems, Atlanta, GA
    • ISS (2000). RealSecure Product Datasheet. Internet Security Systems, Atlanta, GA. Available at http://www.iss.net/customer.care/resource-center/ product_lit/.
    • (2000) RealSecure Product Datasheet
  • 31
    • 0038458266 scopus 로고    scopus 로고
    • An evaluation of negative seelection in an artificial immune system for network intrusion detection
    • Morgan-Kauffman
    • Kim, J. and Bentley, P. J. (2001). An evaluation of negative seelection in an artificial immune system for network intrusion detection. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pages 1330-1337. Morgan-Kauffman.
    • (2001) Proceedings of the Genetic and Evolutionary Computation Conference (GECCO) , pp. 1330-1337
    • Kim, J.1    Bentley, P.J.2
  • 32
    • 9444238520 scopus 로고    scopus 로고
    • Immune memory in the dynamic clonal selection algorithm
    • Timmis, J. and Bentley, P. J., editors, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit
    • Kim, J. and Bentley, P. J. (2002a). Immune memory in the dynamic clonal selection algorithm. In Timmis, J. and Bentley, P. J., editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pages 59-67, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit.
    • (2002) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) , pp. 59-67
    • Kim, J.1    Bentley, P.J.2
  • 33
    • 26844572080 scopus 로고    scopus 로고
    • A model of gene library evolution in the dynamic clonal selection algorithm
    • Timmis, J. and Bentley, P. J., editors, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit
    • Kim, J. and Bentley, P. J. (2002b). A model of gene library evolution in the dynamic clonal selection algorithm. In Timmis, J. and Bentley, P. J., editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pages 182-189, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit.
    • (2002) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) , pp. 182-189
    • Kim, J.1    Bentley, P.J.2
  • 38
    • 0003682772 scopus 로고
    • The need for biases in learning generalizations
    • Rutgers University, New Brunswick, New Jersey
    • Mitchell, T. M. (1980). The need for biases in learning generalizations. Technical Report CBM-TR-117, Rutgers University, New Brunswick, New Jersey.
    • (1980) Technical Report , vol.CBM-TR-117
    • Mitchell, T.M.1
  • 40
    • 84949207675 scopus 로고    scopus 로고
    • Learning from positive data
    • Proceedings of the 6th International Workshop on Inductive Logic Programming. Springer-Verlag
    • Muggleton, S. (1996). Learning from positive data. In Proceedings of the 6th International Workshop on Inductive Logic Programming, volume 1314 of Lecture Notes in Artificial Intelligence, pages 358-376. Springer-Verlag.
    • (1996) Lecture Notes in Artificial Intelligence , vol.1314 , pp. 358-376
    • Muggleton, S.1
  • 43
    • 0027532161 scopus 로고
    • Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination
    • Percus, J. K., Percus, O., and Perelson, A. S. (1993). Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination. Proceedings of the National Academy of Science, 90:1691-1695.
    • (1993) Proceedings of the National Academy of Science , vol.90 , pp. 1691-1695
    • Percus, J.K.1    Percus, O.2    Perelson, A.S.3
  • 46
    • 0010687369 scopus 로고    scopus 로고
    • A survey of connectionist network reuse through transfer
    • Thrun, S. and Pratt, L., editors, chapter 2. Kluwer Academic Publishers
    • Pratt, L. and Jennings, B. (1997). A survey of connectionist network reuse through transfer. In Thrun, S. and Pratt, L., editors, Learning to Learn, chapter 2. Kluwer Academic Publishers.
    • (1997) Learning to Learn
    • Pratt, L.1    Jennings, B.2
  • 47
    • 0000646059 scopus 로고
    • Learning internal representations by error propagation
    • Rumelhart, D. E., McClelland, J. L., et al., editors. MIT Press
    • Rumelhart, D. E., Hinton, G. E., and Williams, R. J. (1987). Learning internal representations by error propagation. In Rumelhart, D. E., McClelland, J. L., et al., editors, Parallel Distributed Processing: Volume 1: Foundations, pages 318-362. MIT Press.
    • (1987) Parallel Distributed Processing: Volume 1: Foundations , vol.1 , pp. 318-362
    • Rumelhart, D.E.1    Hinton, G.E.2    Williams, R.J.3
  • 49
    • 0041957578 scopus 로고    scopus 로고
    • Downloaded in 2003
    • Squid (2003). Squid web proxy cache. http://www.squid-cache.org/, Downloaded in 2003.
    • (2003) Squid Web Proxy Cache
  • 50
    • 84947551624 scopus 로고    scopus 로고
    • Cdis: Towards a computer immune system for detecting network intrusions
    • Lee, W., Me, L., and Wespi, A., editors, RAID 2001. Springer-Verlag
    • Williams, P., Anchor, K., Bebo, J., Gunsch, G., and Lamont, G. (2001). Cdis: Towards a computer immune system for detecting network intrusions. In Lee, W., Me, L., and Wespi, A., editors, RAID 2001, volume 2212 of Lecture Notes in Computer Science, pages 117-133. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2212 , pp. 117-133
    • Williams, P.1    Anchor, K.2    Bebo, J.3    Gunsch, G.4    Lamont, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.