메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 952-956

Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race

Author keywords

AIS; AIS redesign; GENERTIA; Genetic Algorithm; Vulnerability analysis

Indexed keywords

GENERTIA; INTRUSION DETECTION SYSTEM DESIGN; VULNERABILITY ANALYSIS;

EID: 33644537355     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1066677.1066895     Document Type: Conference Paper
Times cited : (14)

References (26)
  • 1
    • 0002511642 scopus 로고    scopus 로고
    • An overview of artificial immune system and their applications
    • D. Dasgupta, ed., Springer
    • Dasgupta, D. (1999). "An Overview of Artificial Immune System and Their Applications", Artificial Immune Systems and Their Applications, D. Dasgupta, ed., pp. 3-21, Springer.
    • (1999) Artificial Immune Systems and Their Applications , pp. 3-21
    • Dasgupta, D.1
  • 2
    • 0003496659 scopus 로고    scopus 로고
    • An immunological model of distributed detection and its application to computer security
    • PhD dissertation
    • Hofmeyr, S. (1999). "An Immunological Model of Distributed Detection and Its Application to Computer Security", PhD dissertation, Department of Computer Sciences, University of New Mexico.
    • (1999) Department of Computer Sciences, University of New Mexico
    • Hofmeyr, S.1
  • 4
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S., and Forrest, S. (1999). "Architecture for an Artificial Immune System", Evolutionary Computation, 7(1):45-68.
    • (1999) Evolutionary Computation , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.1    Forrest, S.2
  • 8
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer network
    • Dasgupta, D., (2002). "An Immunity-Based Technique to Characterize Intrusions in Computer Network", IEEE Transactions on Evolutionary Computation. 6(3): 281-291.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1
  • 9
    • 0034870039 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
    • Kim, J. and Bentley, P. J. (2001), "Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator", Proceedings of the Congress on Evolutionary Computation, pp. 1244-1252.
    • (2001) Proceedings of the Congress on Evolutionary Computation , pp. 1244-1252
    • Kim, J.1    Bentley, P.J.2
  • 20
    • 0004181160 scopus 로고
    • A comparison of selection schemes used in genetic algorithms
    • Computer Engineering and Communication Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, Switzerland
    • Blickle, T. and Thiele, L. (1995) "A Comparison of Selection Schemes used in Genetic Algorithms", TIK Report No. 11, Computer Engineering and Communication Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, Switzerland.
    • (1995) TIK Report No. 11 , vol.11
    • Blickle, T.1    Thiele, L.2
  • 21
    • 0002819121 scopus 로고
    • A comparative analysis of selection schemes used in genetic algorithms
    • Rawlins, G. ed., Morgan Kaufmann.
    • Goldberg, D. and Deb, K "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms", Foundations of Genetic Algorithms, Rawlins, G. ed., 69-93, Morgan Kaufmann. (1989).
    • (1989) Foundations of Genetic Algorithms , pp. 69-93
    • Goldberg, D.1    Deb, K.2
  • 22
    • 84858568728 scopus 로고    scopus 로고
    • last accessed on September 1, 2004
    • Cisco Secure, http://www.cisco.com/warp/public/cc/pd/sqsw/sgidsz/, last accessed on September 1, 2004.
    • Cisco Secure
  • 23
    • 84858562126 scopus 로고    scopus 로고
    • last accessed on September 1, 2004
    • Enterasys Dragon, http://www.enterasys.com/products/ids/, last accessed on September 1, 2004.
    • Enterasys Dragon
  • 24
    • 84858563029 scopus 로고    scopus 로고
    • last accessed on September 1, 2004
    • NFR, http://www.nfr.com/solutions/, last accessed on September 1, 2004.
  • 25
    • 84858563030 scopus 로고    scopus 로고
    • last accessed on September 1, 2004
    • Snort, http://www.snort.org/, last accessed on September 1, 2004.
  • 26


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.