메뉴 건너뛰기




Volumn 12, Issue 4, 2007, Pages 209-217

Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER NETWORKS; COMPUTER SYSTEMS; SECURITY SYSTEMS;

EID: 36749010766     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2007.09.001     Document Type: Article
Times cited : (25)

References (67)
  • 1
    • 33845345985 scopus 로고    scopus 로고
    • Pareto-optimal approaches to neuro-ensemble learning
    • Multi-objective machine learning. Yaochu J. (Ed), Springer-Verlag
    • Abbass H.A. Pareto-optimal approaches to neuro-ensemble learning. In: Yaochu J. (Ed). Multi-objective machine learning. Series: studies in computational intelligence (2005), Springer-Verlag 407-428
    • (2005) Series: studies in computational intelligence , pp. 407-428
    • Abbass, H.A.1
  • 3
    • 36749078835 scopus 로고    scopus 로고
    • Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J. Danger theory: the link between AIS and IDS? In: Second International Conference on Artificial Immune Systems (ICARIS), Edinburgh; 2003.
  • 4
    • 33751017631 scopus 로고    scopus 로고
    • Immune system approaches to intrusion detection - a review
    • pp. 316-29 [Springer]
    • Aickelin U., Greensmith J., and Twycross J. Immune system approaches to intrusion detection - a review. LNCS vol. 4 (2004) pp. 316-29 [Springer]
    • (2004) LNCS , vol.4
    • Aickelin, U.1    Greensmith, J.2    Twycross, J.3
  • 5
    • 32444441216 scopus 로고    scopus 로고
    • Why attacking systems is a good idea
    • Arce I. Why attacking systems is a good idea. IEEE Secur Priv, IEEE Comput Soc 2 (2004) 17-19
    • (2004) IEEE Secur Priv, IEEE Comput Soc , vol.2 , pp. 17-19
    • Arce, I.1
  • 9
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • Barabási A.-L., and Albert R. Emergence of scaling in random networks. Science 286 5439 (1999) 509-512
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabási, A.-L.1    Albert, R.2
  • 10
    • 2142705423 scopus 로고    scopus 로고
    • Aspects of adaptive reconfiguration in a scalable intrusion tolerant system
    • Bryant S., and Wang F. Aspects of adaptive reconfiguration in a scalable intrusion tolerant system. Complexity 9 2 (2003) 74-83
    • (2003) Complexity , vol.9 , Issue.2 , pp. 74-83
    • Bryant, S.1    Wang, F.2
  • 13
    • 0037297883 scopus 로고    scopus 로고
    • Inducing oblique decision trees with evolutionary algorithms
    • Cantu-Paz E., and Kamath C. Inducing oblique decision trees with evolutionary algorithms. IEEE Trans Evol Comput 7 1 (2003) 54-68
    • (2003) IEEE Trans Evol Comput , vol.7 , Issue.1 , pp. 54-68
    • Cantu-Paz, E.1    Kamath, C.2
  • 15
    • 33744821759 scopus 로고    scopus 로고
    • Available from: [retrieved 19.08.05]
    • CERT. CERT/CC statistics 1988-2005. Available from: (2005). [retrieved 19.08.05]
    • (2005) CERT/CC statistics 1988-2005
    • CERT1
  • 16
    • 36749027891 scopus 로고    scopus 로고
    • 2006 E-crime watch survey
    • CSO. 2006 E-crime watch survey. CSO Magaz (2006)
    • (2006) CSO Magaz
    • CSO1
  • 21
    • 0002012598 scopus 로고    scopus 로고
    • The ant colony optimization meta-heuristic
    • McGraw-Hill Ltd., Maidenhead, UK, England pp. 11-32
    • Dorigo M., and Di Caro G. The ant colony optimization meta-heuristic. New ideas in optimization (1999), McGraw-Hill Ltd., Maidenhead, UK, England pp. 11-32
    • (1999) New ideas in optimization
    • Dorigo, M.1    Di Caro, G.2
  • 22
    • 4344625682 scopus 로고    scopus 로고
    • Dozier G, Brown D, Hurley J, Cain K. Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams. In: IEEE Congress on Evolutionary Computation (CEC); 2004.
  • 24
    • 0029716418 scopus 로고    scopus 로고
    • Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix processes. In: 1996 IEEE symposium on security and privacy.
  • 26
    • 77649255325 scopus 로고    scopus 로고
    • IDReAM: intrusion detection and response executed with agent mobility
    • Springer, Berlin pp. 227-39
    • Foukia N. IDReAM: intrusion detection and response executed with agent mobility. Engineering self-organising systems vol. 3464 (2005), Springer, Berlin pp. 227-39
    • (2005) Engineering self-organising systems , vol.3464
    • Foukia, N.1
  • 27
    • 23144451209 scopus 로고    scopus 로고
    • Managing computer networks security through self-organization: a complex system perspective
    • Springer, Berlin pp. 124-38
    • Foukia N., and Hassas S. Managing computer networks security through self-organization: a complex system perspective. Engineering self-organising systems (2004), Springer, Berlin pp. 124-38
    • (2004) Engineering self-organising systems
    • Foukia, N.1    Hassas, S.2
  • 31
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr S.A. Intrusion detection using sequences of system calls. J Comput Secur 6 3 (1998) 151-180
    • (1998) J Comput Secur , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1
  • 33
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr S.A., and Forrest S. Architecture for an artificial immune system. Evol Comput 8 4 (2000) 443-473
    • (2000) Evol Comput , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.A.1    Forrest, S.2
  • 36
    • 36749030260 scopus 로고    scopus 로고
    • Humphries JW, Ragsdale DJ, Carver Jr CA. No silver bullet: inherent limitations of computer. In: Fourth world multiconference on Systemics, Cybernetics, and Informatics (SCI'2000), Orlando, Florida, USA; 2000.
  • 37
    • 0015956495 scopus 로고
    • Towards a network theory of the immune system
    • Jerne N.K. Towards a network theory of the immune system. Ann Immunol 125 1-2 (1974) 373-389
    • (1974) Ann Immunol , vol.125 , Issue.1-2 , pp. 373-389
    • Jerne, N.K.1
  • 38
    • 0027696338 scopus 로고
    • Using genetic algorithms for concept learning
    • Jong K.A., Spears W.M., and Gordon D.F. Using genetic algorithms for concept learning. Machine Learn 13 2-3 (1993) 161-188
    • (1993) Machine Learn , vol.13 , Issue.2-3 , pp. 161-188
    • Jong, K.A.1    Spears, W.M.2    Gordon, D.F.3
  • 39
    • 36749054260 scopus 로고    scopus 로고
    • Juille H, Pollack JB, 1998. Coevolutionary learning: a case study. In: 15th international conference on machine learning, Madison, Wisconsin.
  • 40
    • 0034870039 scopus 로고    scopus 로고
    • Jungwon K, Bentley PJ. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: IEEE Congress on Evolutionary Computation (CEC2001); 2001.
  • 42
    • 0029535737 scopus 로고    scopus 로고
    • Kennedy J, Eberhart R. Particle swarm optimization. In: IEEE international conference on neural networks, Perth, WA, Australia; 1995.
  • 43
    • 0035402074 scopus 로고    scopus 로고
    • DARPA information assurance program dynamic defense experiment summary
    • Kewley D.L., and Bouchard J.F. DARPA information assurance program dynamic defense experiment summary. IEEE Trans Syst Man and Cybern A 31 4 (2001) 331-336
    • (2001) IEEE Trans Syst Man and Cybern A , vol.31 , Issue.4 , pp. 331-336
    • Kewley, D.L.1    Bouchard, J.F.2
  • 44
    • 36749017711 scopus 로고    scopus 로고
    • Kim J, Greensmith J, Twycross J, Aickelin U. Malicious code execution detection and response immune system inspired by the danger theory. In: Adaptive and Resilient Computing Security workshop (ARCS-05); 2005a.
  • 45
    • 36749025371 scopus 로고    scopus 로고
    • Kim J, Wilson W, Aickelin U, McLeod J. Cooperative Automated worm Response and Detection ImmunNe Algorithm (CARDINAL) inspired by T-cell immunity and tolerance. In: Fourth International Conference on Artificial Immune Systems (ICARIS), Banff; 2005b.
  • 46
    • 36749021335 scopus 로고    scopus 로고
    • Kim J, Peter JB. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clone selection [J/OL]. In: IEEE 2002, ISBN: 0-7803-7282-4/02; 2005.
  • 47
    • 2142714171 scopus 로고    scopus 로고
    • Resilient infrastructure for network security
    • Matthew M.W. Resilient infrastructure for network security. Complexity 9 2 (2003) 34-40
    • (2003) Complexity , vol.9 , Issue.2 , pp. 34-40
    • Matthew, M.W.1
  • 50
    • 0034153728 scopus 로고    scopus 로고
    • Cooperative coevolution: an architecture for evolving coadapted subcomponents
    • Potter M.A., and De Jong K.A. Cooperative coevolution: an architecture for evolving coadapted subcomponents. Evol Comput 8 1 (2000) 1-29
    • (2000) Evol Comput , vol.8 , Issue.1 , pp. 1-29
    • Potter, M.A.1    De Jong, K.A.2
  • 52
    • 85090433665 scopus 로고    scopus 로고
    • Roesch M. Snort-lightweight intrusion detection for networks. In: Proceedings of USENIX LISA '99. 1999. p.229-38.
  • 53
    • 36749098115 scopus 로고    scopus 로고
    • Rosin CD. Coevolutionary search among adversaries. PhD, Computer Science, San Diego, University of California; 1997.
  • 55
    • 36749011537 scopus 로고    scopus 로고
    • Shafi K, Abbass H, Zhu W. An adaptive rule-based intrusion detection architecture. In: The security technology conference, the fifth homeland security summit, Canberra, Australia; 2006.
  • 56
    • 84944412883 scopus 로고    scopus 로고
    • Sidiroglou S, Keromytis AD. A network worm vaccine architecture. In: Twelfth IEEE international Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE; 2003.
  • 57
    • 85047322127 scopus 로고    scopus 로고
    • Sinclair C, Pierce L, Matzner S. An application of machine learning to network intrusion detection. In: 15th Annual Computer Security Applications Conference (ACSAC'99) Phoenix, AZ, USA; 1999.
  • 59
    • 36749002913 scopus 로고    scopus 로고
    • Timmis J. Artificial immune systems: a novel data analysis technique inspired by the immune network theory. PhD, Department of Computer Science, University of Wales; 2001.
  • 60
    • 33847299487 scopus 로고    scopus 로고
    • Tsang CH, Kwong S. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: IEEE International Conference on Industrial Technology (ICIT 2005); 2005.
  • 63
    • 20444454972 scopus 로고    scopus 로고
    • Resilience, adaptability and transformability in social-ecological systems
    • Walker B., Holling C.S., Carpenter S.R., and Kinzig A. Resilience, adaptability and transformability in social-ecological systems. Ecol Soc 9 2 (2004) 5
    • (2004) Ecol Soc , vol.9 , Issue.2 , pp. 5
    • Walker, B.1    Holling, C.S.2    Carpenter, S.R.3    Kinzig, A.4
  • 64
    • 36749045965 scopus 로고    scopus 로고
    • Wiegand RP. An analysis of cooperative coevolutionary algorithms. Ph.D. Thesis, George Mason University; 2003.
  • 65
    • 0001387704 scopus 로고
    • Classifier fitness based on accuracy
    • Wilson S.W. Classifier fitness based on accuracy. Evol Comput 3 2 (1995) 149-175
    • (1995) Evol Comput , vol.3 , Issue.2 , pp. 149-175
    • Wilson, S.W.1
  • 67
    • 0027653233 scopus 로고
    • Evolutionary artificial neural networks
    • Yao X. Evolutionary artificial neural networks. Int J Neural Syst 4 3 (1993) 203-222
    • (1993) Int J Neural Syst , vol.4 , Issue.3 , pp. 203-222
    • Yao, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.