메뉴 건너뛰기




Volumn 6, Issue 4, 2007, Pages 413-466

Immune system approaches to intrusion detection - A review

Author keywords

Artificial immune systems; Intrusion detection systems; Literature review

Indexed keywords

ADAPTIVE IMMUNITY; ALGORITHM; COMPUTER ANALYSIS; COMPUTER NETWORK; COMPUTER PROGRAM; COMPUTER SECURITY; COMPUTER SYSTEM; HOST RESISTANCE; IMMUNE RESPONSE; IMMUNE SYSTEM; INFECTION RESISTANCE; INNATE IMMUNITY; MACHINE LEARNING; MEDICAL RESEARCH; ONLINE SYSTEM; REVIEW;

EID: 35449005874     PISSN: 15677818     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11047-006-9026-4     Document Type: Review
Times cited : (223)

References (121)
  • 1
    • 84867715914 scopus 로고    scopus 로고
    • http://discovery.csc.ncsu.edu/software/correlator/
  • 2
    • 84867691364 scopus 로고    scopus 로고
    • http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/
  • 3
    • 84867710436 scopus 로고    scopus 로고
    • http://www.enterasys.com/products/ids/
  • 4
    • 84867691365 scopus 로고    scopus 로고
    • http://www.imperva.com/products/securesphere/
  • 5
    • 84867691242 scopus 로고    scopus 로고
    • http://www.iss.net
  • 6
    • 84867691362 scopus 로고    scopus 로고
    • http://www.prelude-ids.org
  • 9
    • 21244478589 scopus 로고    scopus 로고
    • The danger theory and its application to ais
    • In: Timmis J and Bentley PJ (eds) University of Kent at Canterbury, UK, September 2002 University of Kent at Canterbury Printing Unit
    • Aickelin U and Cayzer S (2002) The danger theory and its application to ais. In: Timmis J and Bentley PJ (eds) Proceeding of the First International Conference on Artificial Immune System (ICARIS-2002), University of Kent at Canterbury, UK, September 2002, pp. 141-148. University of Kent at Canterbury Printing Unit.
    • (2002) Proceeding of the First International Conference on Artificial Immune System (ICARIS-2002) , pp. 141-148
    • Aickelin, U.1    Cayzer, S.2
  • 15
    • 84904336851 scopus 로고    scopus 로고
    • A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine)
    • Begnum K and Burgess M (2003) A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). Integrated Network Management, pp. 31-42
    • (2003) Integrated Network Management , pp. 31-42
    • Begnum, K.1    Burgess, M.2
  • 16
    • 26944493329 scopus 로고    scopus 로고
    • Two ways to grow tissue for artificial immune systems
    • In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
    • Bentley P, Greensmith J and Ujin S (2005) Two ways to grow tissue for artificial immune systems. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 139-152. Springer
    • (2005) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005) , vol.3627 , pp. 139-152
    • Bentley, P.1    Greensmith, J.2    Ujin, S.3
  • 17
    • 0003408496 scopus 로고    scopus 로고
    • Irvine, CA: University of California, Department of Information and Computer Science
    • Blake CL and Merz CJ (1998) Uci repository of machine learning databases. http://www.ics.uci.edu/mlearn/MLRepository.htm. Irvine, CA: University of California, Department of Information and Computer Science
    • (1998) Uci Repository of Machine Learning Databases
    • Blake, C.L.1    Merz, C.J.2
  • 23
    • 84959039793 scopus 로고    scopus 로고
    • Two dimensional time-series for anomaly detection and regulation in adaptive systems
    • In: Feridum M et al. (eds) Lecture Notes in Computer Science Springer-Verlag
    • Burgess M (2002) Two dimensional time-series for anomaly detection and regulation in adaptive systems. In: Feridum M et al. (eds) Proceedings of 13th IFIP/IEEE International Workshop on Distributed System, Operations and Management (DSOM 2002), Vol. 2506, Lecture Notes in Computer Science, pp. 169-180. Springer-Verlag
    • (2002) Proceedings of 13th IFIP/IEEE International Workshop on Distributed System, Operations and Management (DSOM 2002) , vol.2506 , pp. 169-180
    • Burgess, M.1
  • 24
    • 2442625568 scopus 로고    scopus 로고
    • Configurable immunity for evolving human-computer systems
    • Burgess M (2004) Configurable immunity for evolving human-computer systems. Science of Computer Programming 51:197-213
    • (2004) Science of Computer Programming , vol.51 , pp. 197-213
    • Burgess, M.1
  • 25
    • 15544363043 scopus 로고    scopus 로고
    • Principle components and importance ranking of distributed anomalies
    • Burgess M (2004) Principle components and importance ranking of distributed anomalies. Machine Learning 58: 217-230
    • (2004) Machine Learning , vol.58 , pp. 217-230
    • Burgess, M.1
  • 26
    • 30344486259 scopus 로고    scopus 로고
    • Probabilistic anomaly detection in distributed computer networks
    • Burgess M (2006) Probabilistic anomaly detection in distributed computer networks. Science of Computer Programming 60: 1-26
    • (2006) Science of Computer Programming , vol.60 , pp. 1-26
    • Burgess, M.1
  • 31
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6(3):281-291
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzalez, F.2
  • 37
  • 38
    • 35048839283 scopus 로고    scopus 로고
    • Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
    • In: Deb K et al. (eds) Part I, Lecture Notes in Computer Science, Seattle, WA, USA, 26-30 June 2004, ISGEC, Springer-Verlag
    • Dozier G, Brown D, Hurley J and Cain K (2004) Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers. In: Deb K et al. (eds) Genetic and Evolutionary Computation - GECCO-2004, Part I, Vol. 3102, Lecture Notes in Computer Science, Seattle, WA, USA, 26-30 June 2004, pp. 263-274. ISGEC, Springer-Verlag
    • (2004) Genetic and Evolutionary Computation - GECCO-2004 , vol.3102 , pp. 263-274
    • Dozier, G.1    Brown, D.2    Hurley, J.3    Cain, K.4
  • 39
    • 21244476388 scopus 로고    scopus 로고
    • On the use of negative selection in an artificial immune system
    • In: New York, USA, July 2002 Morgan Kaufmann
    • Ebner M, Breunig H and Albert J (2002) On the use of negative selection in an artificial immune system. In: Proceedings of GECCO-2002, New York, USA, July 2002, pp. 957-964. Morgan Kaufmann
    • (2002) Proceedings of GECCO-2002 , pp. 957-964
    • Ebner, M.1    Breunig, H.2    Albert, J.3
  • 41
    • 33751021639 scopus 로고    scopus 로고
    • The crossover closure and partial match detection
    • In: Timmis J, Bentley P and Hart E (eds) Lecture Notes in Computer Science, Edinburgh, UK, September 2003 Springer-Verlag
    • Esponda F, Forrest S and Helman P (2003) The crossover closure and partial match detection. In: Timmis J, Bentley P and Hart E (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS'-03), Vol. 2787, Lecture Notes in Computer Science, Edinburgh, UK, September 2003, pp. 249-260. Springer-Verlag
    • (2003) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS'-03) , vol.2787 , pp. 249-260
    • Esponda, F.1    Forrest, S.2    Helman, P.3
  • 43
    • 24644520611 scopus 로고    scopus 로고
    • Unsupervised anomaly detection based on an evolutionary artificial immune network
    • In: Rothlauf F et al. (eds) Lecture Notes in Computer Science Springer
    • Fang L and Le-Ping L (2005) Unsupervised anomaly detection based on an evolutionary artificial immune network. In: Rothlauf F et al. (eds) Proceeding of Applications of Evolutionary Computing, EvoWorkshops-2005, Vol. 3449, Lecture Notes in Computer Science, pp. 166-174. Springer
    • (2005) Proceeding of Applications of Evolutionary Computing, EvoWorkshops-2005 , vol.3449 , pp. 166-174
    • Fang, L.1    Le-Ping, L.2
  • 44
    • 46149127936 scopus 로고
    • The immune system, adaptation and machine learning
    • Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation and machine learning. Physica D 22:187-204
    • (1986) Physica D , vol.22 , pp. 187-204
    • Farmer, J.D.1    Packard, N.H.2    Perelson, A.S.3
  • 46
    • 21244465997 scopus 로고    scopus 로고
    • How do we evaluate artificial immune systems?
    • Garrett SM (2005) How do we evaluate artificial immune systems?. Evolutionary Computation, 13(2):145-178
    • (2005) Evolutionary Computation , vol.13 , Issue.2 , pp. 145-178
    • Garrett, S.M.1
  • 47
    • 21244441082 scopus 로고    scopus 로고
    • A machine learning evaluation of an artificial immune system
    • Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2):179-212
    • (2005) Evolutionary Computation , vol.13 , Issue.2 , pp. 179-212
    • Glickman, M.1    Balthrop, J.2    Forrest, S.3
  • 50
    • 15744364465 scopus 로고    scopus 로고
    • A study of artificial immune systems applied to anomaly detection
    • PhD thesis, The University of Memphis, May 2003
    • Gonzalez F (2003) A study of artificial immune systems applied to anomaly detection. PhD thesis, The University of Memphis, May 2003
    • (2003)
    • Gonzalez, F.1
  • 52
    • 35248816526 scopus 로고    scopus 로고
    • A randomized real-valued negative selection algorithm
    • In: Timmis J, Bentley P and Hart E (eds) Lecture Notes in Comupter Science, Edinburgh, UK, September 2003 Springer
    • Gonzalez F, Dagupta D and Nino LF (2003) A randomized real-valued negative selection algorithm. In: Timmis J, Bentley P and Hart E (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-2003), Vol. 2787, Lecture Notes in Comupter Science, Edinburgh, UK, September 2003, pp. 261-272. Springer
    • (2003) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-2003) , vol.2787 , pp. 261-272
    • Gonzalez, F.1    Dagupta, D.2    Nino, L.F.3
  • 56
    • 32444446071 scopus 로고    scopus 로고
    • Discriminating and visualizing anomalies using negative selection and self-organizing maps
    • In: Beyer H-G et al. (eds) Washington DC, USA, 25-29, June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
    • Gonzalez FA, Galeano JC, Rojas DA and Veloza-Suan A (2005) Discriminating and visualizing anomalies using negative selection and self-organizing maps. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington DC, USA, 25-29, June 2005, pp. 297-304. ACM SIGEVO (formerly ISGEC), ACM Press
    • (2005) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation , vol.1 , pp. 297-304
    • Gonzalez, F.A.1    Galeano, J.C.2    Rojas, D.A.3    Veloza-Suan, A.4
  • 58
    • 26944469543 scopus 로고    scopus 로고
    • Introducing dendritic cells as a novel immune inspired algorithm for anomaly detection
    • In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alberta, Canada, August 2005 Springer
    • Greensmith J, Aickelin U and Cayzer S (2005) Introducing dendritic cells as a novel immune inspired algorithm for anomaly detection. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alberta, Canada, August 2005, pp. 153-167. Springer
    • (2005) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005) , vol.3627 , pp. 153-167
    • Greensmith, J.1    Aickelin, U.2    Cayzer, S.3
  • 59
    • 34547523883 scopus 로고    scopus 로고
    • Constructing detectors in schema complementary spce for anomaly detection
    • In: Deb K et al. (eds) Lecture Notes in Computer Science Springer-Verlag
    • Hang X and Dai H (2004) Constructing detectors in schema complementary spce for anomaly detection. In: Deb K et al. (eds) Proceedings of GECCO'2004, Vol. 3102, Lecture Notes in Computer Science, pp. 275-286. Springer-Verlag
    • (2004) Proceedings of GECCO'2004 , vol.3102 , pp. 275-286
    • Hang, X.1    Dai, H.2
  • 60
    • 32444435567 scopus 로고    scopus 로고
    • Applying both positive and negative selection to supervised learning for anomaly detection
    • In: Beyer H-G et al. (eds) Washington DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
    • Hang X and Dai H (2005) Applying both positive and negative selection to supervised learning for anomaly detection. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington DC, USA, 25-29 June 2005, pp. 345-352. ACM SIGEVO (formerly ISGEC), ACM Press
    • (2005) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation , vol.1 , pp. 345-352
    • Hang, X.1    Dai, H.2
  • 62
    • 0003496659 scopus 로고    scopus 로고
    • An immunological model of distributed detection and its application to computer security
    • PhD thesis, University Of New Mexico
    • Hofmeyr S (1999) An immunological model of distributed detection and its application to computer security. PhD thesis, University Of New Mexico
    • (1999)
    • Hofmeyr, S.1
  • 63
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr S, Forrest S (1998) Intrusion detection using sequences of system calls. Journal of Computer Security 6:151-180
    • (1998) Journal of Computer Security , vol.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2
  • 65
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evolutionary Computation 7(1):45-68
    • (2000) Evolutionary Computation , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.1    Forrest, S.2
  • 67
    • 0344083606 scopus 로고    scopus 로고
    • An artificial immune system for securing mobile ad hoc networks against intrusion attacks
    • In: Priddy KL and Angeline PJ (eds) Intelligent Computing: Theory and Applications
    • Hortos WS (2003) An artificial immune system for securing mobile ad hoc networks against intrusion attacks. In: Priddy KL and Angeline PJ (eds) Proceeding of SPIE, Vol. 5103, Intelligent Computing: Theory and Applications, pp. 74-91
    • (2003) Proceeding of SPIE , vol.5103 , pp. 74-91
    • Hortos, W.S.1
  • 68
    • 33644537355 scopus 로고    scopus 로고
    • Immunity-based intrusion detection system design, vulnerability analysis, and the genertia genetic arms race
    • In: Haddad H et al. (eds) Santa Fe, New Mexico, 13-17 March 2005 ACM Press
    • Hou H and Dozier G (2005) Immunity-based intrusion detection system design, vulnerability analysis, and the genertia genetic arms race. In: Haddad H et al. (eds) Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico, 13-17 March 2005, pp. 961-965. ACM Press
    • (2005) Proceedings of the 2005 ACM Symposium on Applied Computing , pp. 961-965
    • Hou, H.1    Dozier, G.2
  • 70
    • 0000047098 scopus 로고
    • Towards a network theory of the immune system
    • Jerne NK (1974) Towards a network theory of the immune system. Annals of Immunology
    • (1974) Annals of Immunology
    • Jerne, N.K.1
  • 71
    • 4344597939 scopus 로고    scopus 로고
    • Augmented negative selection algorithm with variable-coverage detectors
    • In: Portland, Oregon (U.S.A.), June 2004
    • Ji Z and Dasgupta D (2004) Augmented negative selection algorithm with variable-coverage detectors. In: Proceedings of Congress on Evolutionary Computation (CEC-04), Portland, Oregon (U.S.A.), June 2004, pp. 1081-1088
    • (2004) Proceedings of Congress on Evolutionary Computation (CEC-04) , pp. 1081-1088
    • Ji, Z.1    Dasgupta, D.2
  • 72
    • 26944471838 scopus 로고    scopus 로고
    • Real-valued negative selection using variable-sized detectors
    • In: Deb K et al. (eds) Lecture Notes in Computer Science, Seattle, WA, June 2004 Springer-Verlag
    • Ji Z and Dasgupta D (2004) Real-valued negative selection using variable-sized detectors. In: Deb K et al. (eds) Proceeding of Genetic and Evolutionary Computation Conference (GECCO-2004), Lecture Notes in Computer Science, Seattle, WA, June 2004, pp. 287-298. Springer-Verlag
    • (2004) Proceeding of Genetic and Evolutionary Computation Conference (GECCO-2004) , pp. 287-298
    • Ji, Z.1    Dasgupta, D.2
  • 73
    • 32444438530 scopus 로고    scopus 로고
    • Estimating the detector coverage in a negative selection algorithm
    • In: Beyer H-G et al. (eds) Washington, DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
    • Ji Z and Dasgupta D (2005) Estimating the detector coverage in a negative selection algorithm. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington, DC, USA, 25-29 June 2005, pp. 281-288. ACM SIGEVO (formerly ISGEC), ACM Press
    • (2005) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation , vol.1 , pp. 281-288
    • Ji, Z.1    Dasgupta, D.2
  • 74
    • 33751015379 scopus 로고    scopus 로고
    • A peer-to-peer blacklisting strategy inspired by leukocyte-endothelium interaction
    • In: Jacob C, Pilat ML, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
    • Trapnell BC Jr (2005) A peer-to-peer blacklisting strategy inspired by leukocyte-endothelium interaction. In: Jacob C, Pilat ML, Bentley PJ and Timmis J (eds) Proceedings of the 4th International Conference on Artificial Immune Systems-2005, Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 362-373. Springer
    • (2005) Proceedings of the 4th International Conference on Artificial Immune Systems-2005 , vol.3627 , pp. 362-373
    • Trapnell Jr., B.C.1
  • 75
    • 35248895863 scopus 로고    scopus 로고
    • The effect of antibody morphology on non-self detection
    • In: Timmis J, Bentley P and Verrelst H (eds) Lecture Notes on Computer Science, Edinburgh, UK, September 2003 Springer-Verlag
    • Kaers J, Wheeler R and Verrelst H (2003) The effect of antibody morphology on non-self detection. In: Timmis J, Bentley P and Verrelst H (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-03), Vol. 2787, Lecture Notes on Computer Science, Edinburgh, UK, September 2003, pp. 285-295. Springer-Verlag
    • (2003) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-03) , vol.2787 , pp. 285-295
    • Kaers, J.1    Wheeler, R.2    Verrelst, H.3
  • 82
    • 0038458266 scopus 로고    scopus 로고
    • Evaluating negative selection in an artificial immune system for network intrusion detection
    • In: July 2001
    • Kim J and Bentley P (2001) Evaluating negative selection in an artificial immune system for network intrusion detection. In: Proceedings of GECCO, July 2001, pp. 1330-1337
    • (2001) Proceedings of GECCO , pp. 1330-1337
    • Kim, J.1    Bentley, P.2
  • 83
    • 84901408225 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
    • In: Honolulu, Hawaii, May 2002
    • Kim J and Bentley P (2002) Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection. In: Proceeding of the Congress on Evolutionary Computation (CEC-2002), Honolulu, Hawaii, May 2002, pp. 1015-1020
    • (2002) Proceeding of the Congress on Evolutionary Computation (CEC-2002) , pp. 1015-1020
    • Kim, J.1    Bentley, P.2
  • 84
    • 3543122436 scopus 로고    scopus 로고
    • Immune memory and gene library evolution in the dynamical clonal selection algorithm
    • Kim J, Bentley P (2004) Immune memory and gene library evolution in the dynamical clonal selection algorithm. Journal of Genetic Programming and Evolvable Machines 5(4):361-391
    • (2004) Journal of Genetic Programming and Evolvable Machines , vol.5 , Issue.4 , pp. 361-391
    • Kim, J.1    Bentley, P.2
  • 85
    • 0034870039 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
    • In: Seoul, Korea
    • Kim J and Bentley PJ (2001) Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceeding of the Congress on Evolutionary Computation (CEC- 2001), Seoul, Korea, pp. 1244-1252
    • (2001) Proceeding of the Congress on Evolutionary Computation (CEC- 2001) , pp. 1244-1252
    • Kim, J.1    Bentley, P.J.2
  • 87
    • 26944468992 scopus 로고    scopus 로고
    • Cooperative automated worm response and detection immune algorithm (cardinal) inspidred by t-cell immunity and tolerance
    • In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
    • Kim J, Wilson W, Aickelin U and McLeod J (2005) Cooperative automated worm response and detection immune algorithm (cardinal) inspidred by t-cell immunity and tolerance. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th National Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 168-181. Springer
    • (2005) Proceeding of the 4th National Conference on Artificial Immune Systems (ICARIS-2005) , vol.3627 , pp. 168-181
    • Kim, J.1    Wilson, W.2    Aickelin, U.3    McLeod, J.4
  • 88
    • 0242498985 scopus 로고    scopus 로고
    • Integrating Artificial Immune Algorithms for Intrusion Detection
    • PhD thesis, University College London
    • Kim JW (2002) Integrating Artificial Immune Algorithms for Intrusion Detection. PhD thesis, University College London
    • (2002)
    • Kim, J.W.1
  • 89
    • 35448998638 scopus 로고    scopus 로고
    • Lincoln Labs MIT Lincoln Labs
    • Lincoln Labs (1999) dataset. MIT Lincoln Labs
    • (1999) Dataset
  • 92
    • 35448994124 scopus 로고    scopus 로고
    • Technical Report 02-04, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, January 2002
    • Lundin E and Jonsson E (2002) Survey of research in the intrusion detection area. Technical Report 02-04, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, January 2002
    • (2002) Survey of Research in the Intrusion Detection Area
    • Lundin, E.1    Jonsson, E.2
  • 95
    • 79958186026 scopus 로고    scopus 로고
    • Building attack scenarios through integration of complementary alert correlation method
    • Ning P, Xu D, Healey CG and Amant RS (2004) Building attack scenarios through integration of complementary alert correlation method. In: NDSS
    • (2004) NDSS
    • Ning, P.1    Xu, D.2    Healey, C.G.3    Amant, R.S.4
  • 96
    • 0038223829 scopus 로고    scopus 로고
    • NIST NIST Computer Science Special Reports SP 800-31, November 2001
    • NIST (2001) Intrusion detection systems. NIST Computer Science Special Reports SP 800-31, November 2001
    • (2001) Intrusion Detection Systems
  • 101
    • 35048854187 scopus 로고    scopus 로고
    • An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors
    • In: Catania, Italy, September 2004
    • Sarafijanovic S and Le Boudec J (2004) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. In: Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS'-04), Catania, Italy, September 2004, pp. 342-356
    • (2004) Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS'-04) , pp. 342-356
    • Sarafijanovic, S.1    Le Boudec, J.2
  • 102
    • 32444442909 scopus 로고    scopus 로고
    • An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
    • In: Beyer H-G et al. (eds) Washington, DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
    • Shapiro JM, Lamont GB and Peterson GL (2005) An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington, DC, USA, 25-29 June 2005, pp. 337-344. ACM SIGEVO (formerly ISGEC), ACM Press
    • (2005) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation , vol.1 , pp. 337-344
    • Shapiro, J.M.1    Lamont, G.B.2    Peterson, G.L.3
  • 103
    • 1442339891 scopus 로고    scopus 로고
    • Anomaly detection using negative selection based on the r-contiguous matching rule
    • In: Timmis J and Bentley PJ (eds) Canterbury, UK, September 2002
    • Singh S (2002) Anomaly detection using negative selection based on the r-contiguous matching rule. In: Timmis J and Bentley PJ (eds) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02), Canterbury, UK, September 2002, pp. 99-106
    • (2002) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02) , pp. 99-106
    • Singh, S.1
  • 104
    • 0000190905 scopus 로고
    • Searching for diverse, cooperative population with genetic algorithms
    • Smith RE, Forrest S, Perelson AS (1993) Searching for diverse, cooperative population with genetic algorithms. Evolutionary Computation 1(2):127-149
    • (1993) Evolutionary Computation , vol.1 , Issue.2 , pp. 127-149
    • Smith, R.E.1    Forrest, S.2    Perelson, A.S.3
  • 107
    • 0037781377 scopus 로고    scopus 로고
    • Operating system stability and security through process homeostasis
    • PhD thesis, University Of New Mexico
    • Somayaji AB (2002) Operating system stability and security through process homeostasis. PhD thesis, University Of New Mexico
    • (2002)
    • Somayaji, A.B.1
  • 109
    • 35048863919 scopus 로고    scopus 로고
    • An investigation of r-chunk detector generation on higher alphabets
    • In: Deb K et al. (eds) Lecture Notes in Computer Science
    • Stibor T, Bayarou KM and Eckert C (2004) An investigation of r-chunk detector generation on higher alphabets. In: Deb K et al. (eds) Proceedings of GECCO' 2004, Vol. 3102, Lecture Notes in Computer Science, pp. 299-307
    • (2004) Proceedings of GECCO' 2004 , vol.3102 , pp. 299-307
    • Stibor, T.1    Bayarou, K.M.2    Eckert, C.3
  • 110
    • 32444436687 scopus 로고    scopus 로고
    • Is negative selection appropriate for anomaly detection?
    • In: Beyer H-G et al. (eds) Washington, DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
    • Stibor T, Mohr P, Timmis J and Eckert C (2005) Is negative selection appropriate for anomaly detection? In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington, DC, USA, 25-29 June 2005, pp. 321-328. ACM SIGEVO (formerly ISGEC), ACM Press
    • (2005) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation , vol.1 , pp. 321-328
    • Stibor, T.1    Mohr, P.2    Timmis, J.3    Eckert, C.4
  • 111
    • 26944442701 scopus 로고    scopus 로고
    • A comparative study of real-valued negative selection to statistical anomaly detection techniques
    • In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
    • Stibor T, Timmis J and Eckert C (2005) A comparative study of real-valued negative selection to statistical anomaly detection techniques. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 262-275. Springer
    • (2005) Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005) , vol.3627 , pp. 262-275
    • Stibor, T.1    Timmis, J.2    Eckert, C.3
  • 112
    • 27144451393 scopus 로고    scopus 로고
    • On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system
    • In: Edinburgh, UK, September 2005 IEEE Press
    • Stibor T, Timmis J and Eckert C (2005) On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system. In: Proceedings of the Congress on Evolutionary Computation (CEC-2005), Edinburgh, UK, September 2005, pp. 995-1002. IEEE Press
    • (2005) Proceedings of the Congress on Evolutionary Computation (CEC-2005) , pp. 995-1002
    • Stibor, T.1    Timmis, J.2    Eckert, C.3
  • 114
    • 26944450016 scopus 로고    scopus 로고
    • Towards a conceptual framework for innate immunity
    • In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
    • Twycross J and Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 112-125. Springer
    • (2005) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005) , vol.3627 , pp. 112-125
    • Twycross, J.1    Aickelin, U.2
  • 118
    • 84868256861 scopus 로고    scopus 로고
    • Intelligent Information Systems, Advances in Soft Computing Series of Physica-Verlag. Physica-Verlag, Heidelberg, New York
    • Wierzchon ST (2000) Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System, pp. 119-133. Intelligent Information Systems, Advances in Soft Computing Series of Physica-Verlag. Physica-Verlag, Heidelberg, New York
    • (2000) Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System , pp. 119-133
    • Wierzchon, S.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.