메뉴 건너뛰기




Volumn 7, Issue 2, 2007, Pages 547-553

Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

Author keywords

Artificial immune systems; GENERTIA; Intrusion detection systems

Indexed keywords

GENETIC ALGORITHMS; MATHEMATICAL MODELS; OPTIMIZATION; SECURITY OF DATA;

EID: 33846814873     PISSN: 15684946     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.asoc.2006.05.001     Document Type: Article
Times cited : (18)

References (29)
  • 9
    • 0002511642 scopus 로고    scopus 로고
    • An overview of artificial immune systems and their applications
    • Dasgupta D. (Ed), Springer
    • Dasgupta D. An overview of artificial immune systems and their applications. In: Dasgupta D. (Ed). Artificial Immune Systems and Their Applications (1999), Springer 3-21
    • (1999) Artificial Immune Systems and Their Applications , pp. 3-21
    • Dasgupta, D.1
  • 10
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • (IEEE Press)
    • Dasgupta D., and Gonzalez F. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 6 3 (2002) 281-291 (IEEE Press)
    • (2002) IEEE Trans. Evol. Comput. , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzalez, F.2
  • 12
    • 0002819121 scopus 로고
    • A comparative analysis of selection schemes used in genetic algorithms
    • Rawlins G.J.E. (Ed), Morgan Kaufmann Publishers
    • Goldberg D.E., and Deb K. A comparative analysis of selection schemes used in genetic algorithms. In: Rawlins G.J.E. (Ed). Foundations of Genetic Algorithms (1989), Morgan Kaufmann Publishers 69-93
    • (1989) Foundations of Genetic Algorithms , pp. 69-93
    • Goldberg, D.E.1    Deb, K.2
  • 13
    • 33846799724 scopus 로고    scopus 로고
    • S. Hofmeyr, An Immunological Model of Distributed Detection and Its Application to Computer Security, PhD Dissertation, Department of Computer Science, The University of New Mexico, 1999.
  • 15
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr S., and Forrest S. Architecture for an artificial immune system. Evol. Comput. 7 1 (1999) 45-68
    • (1999) Evol. Comput. , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.1    Forrest, S.2
  • 18
    • 33846806339 scopus 로고    scopus 로고
    • H. Hou, Artificial Immunity for Computer Network with Constraint-Based Detector, Masters Thesis, Department of Computer Science and Software Engineering, Auburn University, 2002.
  • 26
    • 84957039800 scopus 로고    scopus 로고
    • A. Somayaji, S. Hofmeyr, S. Forrest, Principles of a Computer Immune System, The New Security Paradigm Workshop, 1997, pp. 75-82.
  • 27
    • 33846817729 scopus 로고    scopus 로고
    • A.J. Stewart, Distributed Metastasis: A Computer Network Penetration Methodology, 1999, available at: http://www.citeseer.nj.nec.com/387640.html.
  • 29
    • 33846806338 scopus 로고    scopus 로고
    • J. Zhu, Use of an Immune Model to Improve Intrusion Detection on Dynamic Broadcast Local Area Networks, Masters Thesis, Department of Computer Science & Software Engineering, Auburn University, 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.