메뉴 건너뛰기




Volumn 50, Issue 22, 2005, Pages 2650-2657

An immune based dynamic intrusion detection model

Author keywords

Artificial immune system; Immune memory; Immune tolerance; Intrusion detection; Negative selection

Indexed keywords


EID: 33744795217     PISSN: 10016538     EISSN: 18619541     Source Type: Journal    
DOI: 10.1360/982005-62     Document Type: Article
Times cited : (59)

References (20)
  • 2
    • 24144447453 scopus 로고    scopus 로고
    • Beijing: Publishing House of Electronics Industry
    • Li, T., Computer Immunology, Beijing: Publishing House of Electronics Industry, 2004.
    • (2004) Computer Immunology
    • Li, T.1
  • 3
    • 71649110512 scopus 로고    scopus 로고
    • Artificial immune systems as a novel soft computing paradigm
    • de Castro, L. N., Timmis, J. I., Artificial immune systems as a novel soft computing paradigm, Soft Computing Journal, 2003, 7(8): 526-544.
    • (2003) Soft Computing Journal , vol.7 , Issue.8 , pp. 526-544
    • De Castro, L.N.1    Timmis, J.I.2
  • 6
    • 33744816550 scopus 로고    scopus 로고
    • An immunity based network security risk estimation
    • Li, T., An immunity based network security risk estimation, Science in China, Ser. F, 2005, 48(5).
    • (2005) Science in China, Ser. F , vol.48 , Issue.5
    • Li, T.1
  • 7
    • 3142752196 scopus 로고    scopus 로고
    • Development and prospect of the artificial immune system
    • Jiao, L., Du, H., Development and prospect of the artificial immune system, Acta Electronica Sinica, 2003, 31(10): 1540-1548.
    • (2003) Acta Electronica Sinica , vol.31 , Issue.10 , pp. 1540-1548
    • Jiao, L.1    Du, H.2
  • 8
    • 0037910212 scopus 로고    scopus 로고
    • Artificial immune system: Principle, models, analysis and perspectives
    • Xiao, R., Wang, L., Artificial immune system: principle, models, analysis and perspectives, Chinese Journal of Computers, 2002, 25(12): 1281-1293.
    • (2002) Chinese Journal of Computers , vol.25 , Issue.12 , pp. 1281-1293
    • Xiao, R.1    Wang, L.2
  • 9
    • 0027961889 scopus 로고
    • Self-nonself discrimination in a computer
    • Oakland, CA: IEEE Computer Society Press
    • Forrest, S., Perelson, A. S., Self-nonself discrimination in a computer, in IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1994, 202-213.
    • (1994) IEEE Symposium on Security and Privacy , pp. 202-213
    • Forrest, S.1    Perelson, A.S.2
  • 11
    • 0002320533 scopus 로고    scopus 로고
    • Immunity by design: An artificial immune system
    • San Francisco, CA: IEEE Press
    • Hofmeyr, S., Forrest, S., Immunity by design: An artificial immune system, in Genetic Evolutionary Computation Conf., San Francisco, CA: IEEE Press, 1999, 1289-1296.
    • (1999) Genetic Evolutionary Computation Conf. , pp. 1289-1296
    • Hofmeyr, S.1    Forrest, S.2
  • 12
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S., Forrest, S., Architecture for an artificial immune system, Evolutionary Computation, 2000, 8(4): 443-473.
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 13
    • 2642548686 scopus 로고    scopus 로고
    • Immunity-based intrusion detection system: A general framework
    • Crystal City, VA: CISSE
    • Dasgupta, D., Immunity-based intrusion detection system: A general framework, in The 22nd National Information Systems Security Conf., Crystal City, VA: CISSE, 1999, 147-160.
    • (1999) The 22nd National Information Systems Security Conf. , pp. 147-160
    • Dasgupta, D.1
  • 15
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithm, analysis and implication
    • Oakland, CA: IEEE Computer Society Press
    • D'haeseleer, P., Forrest, S., An immunological approach to change detection: Algorithm, analysis and implication, in IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1996, 110-119.
    • (1996) IEEE Symposium on Research in Security and Privacy , pp. 110-119
    • D'Haeseleer, P.1    Forrest, S.2
  • 16
    • 84901408225 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
    • Honolulu: IEEE Press
    • Kim, J., Bentley, P. J., Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection, in The Congress on Evolutionary Computation (CEC-2002), Honolulu: IEEE Press, 2002, 1015-1020.
    • (2002) The Congress on Evolutionary Computation (CEC-2002) , pp. 1015-1020
    • Kim, J.1    Bentley, P.J.2
  • 17
    • 33749856978 scopus 로고    scopus 로고
    • A new model of intrusion detection based on artificial immune theory
    • Liang, K. X., Li, T., A new model of intrusion detection based on artificial immune theory, Computer Engineering and Applications, 2005, 41(2): 129-132.
    • (2005) Computer Engineering and Applications , vol.41 , Issue.2 , pp. 129-132
    • Liang, K.X.1    Li, T.2
  • 20
    • 0018005935 scopus 로고
    • Can programming be liberated from the Von Neumann style? A functional style and its algebra of programs
    • Backus, J., Can programming be liberated from the Von Neumann style? A functional style and its algebra of programs, Communications of the ACM, 1978, 21 (8): 613-641.
    • (1978) Communications of the ACM , vol.21 , Issue.8 , pp. 613-641
    • Backus, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.