메뉴 건너뛰기




Volumn 51, Issue 5, 2007, Pages 1315-1333

Using the danger model of immune systems for distributed defense in modern data networks

Author keywords

Artificial immune systems; Intrusion detection systems; Malware; Pervasive computing; Security; Virus; Worm

Indexed keywords

COMPUTER VIRUSES; COMPUTER WORMS; LARGE SCALE SYSTEMS;

EID: 33846238581     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.09.015     Document Type: Article
Times cited : (35)

References (21)
  • 2
    • 33846236235 scopus 로고    scopus 로고
    • Uwe Aickelin, Steve Cayzer, The Danger Theory and its application to artificial immune systems, in: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, 2002, pp. 141-148.
  • 4
    • 33846185404 scopus 로고    scopus 로고
    • CERT advisory CA-2001-19 Code Red worm exploiting buffer overflow in IIS indexing service DLL, Web page at , January 2002.
  • 6
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr S., and Forrest S. Architecture for an artificial immune system. Evolutionary Computation Journal 8 4 (2000) 443-473
    • (2000) Evolutionary Computation Journal , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 9
    • 85066851244 scopus 로고    scopus 로고
    • C. Kruegel, W. Robertson, Alert verification: determining the success of intrusion attempts, in: 1st Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, July, 2004.
  • 10
    • 33846252647 scopus 로고    scopus 로고
    • G.H. Kim, E.H. Spafford, The design and implementation of Tripwire: a file system integrity checker, Technical Report CSD-TR-93-071, Purdue University, Dept. of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, 1993.
  • 11
    • 33846205478 scopus 로고    scopus 로고
    • Jeffrey O. Kephart, Gregory B. Sorkin, Generic disinfection of programs infected with a computer virus, US Patent 5,613,002, US Patent Office, March, 1997.
  • 15
    • 33846232562 scopus 로고    scopus 로고
    • Jeffrey O. Kephart, Steve R. White, Directed-graph epidemiological models of computer viruses, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, April, 2002, pp. 343-359.
  • 16
    • 0037066427 scopus 로고    scopus 로고
    • The danger model: a renewed sense of self
    • Matzinger P. The danger model: a renewed sense of self. Science 296 (2002) 301-305
    • (2002) Science , vol.296 , pp. 301-305
    • Matzinger, P.1
  • 18
    • 0031684427 scopus 로고
    • Combinatorial pattern discovery in biological sequences: the TEIRESIAS algorithm
    • Rigoutsos I., and Floratos A. Combinatorial pattern discovery in biological sequences: the TEIRESIAS algorithm. Bioinformatics 14 1 (1988)
    • (1988) Bioinformatics , vol.14 , Issue.1
    • Rigoutsos, I.1    Floratos, A.2
  • 19
    • 33846252645 scopus 로고    scopus 로고
    • W32/Sasser-A. Web page at , May, 2004.
  • 20
    • 33846194112 scopus 로고    scopus 로고
    • Morton Swimmer, Malware Intrusion Detection, Ph.D. thesis, University of Hamburg, Fachbereich Informatik Hamburg, Germany, June, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.