메뉴 건너뛰기




Volumn 12, Issue 4, 2007, Pages 218-227

Sensing danger: Innate immunology for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; IMMUNOLOGY; PROBLEM SOLVING; SECURITY SYSTEMS;

EID: 36749081002     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2007.10.003     Document Type: Article
Times cited : (44)

References (25)
  • 1
    • 36749034455 scopus 로고    scopus 로고
    • Aickelin U, Cayzer S. The danger theory and its application to artificial immune systems. In: Proceedings of the 1st international conference on artificial immune systems (ICARIS 2002), Canterbury, UK; 2002. p. 141-48.
  • 3
    • 26944469543 scopus 로고    scopus 로고
    • Greensmith J, Aickelin U, Cayzer S. Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: ICARIS-05. LNCS, vol. 3627; 2005. p. 153-67.
  • 4
    • 33751020563 scopus 로고    scopus 로고
    • Greensmith J, Aickelin U, Twycross J. Articulation and clarification of the dendritic cell algorithm. In: ICARIS-06, Oeiras, Portugal. LNCS, vol. 4163; 2006. p. 404-17.
  • 5
    • 34547278626 scopus 로고    scopus 로고
    • Greensmith J, Twycross J, Aickelin U. Dendritic cells for anomaly detection. In: CEC-06, Vancouver, Canada; 2006. p. 664-71.
  • 6
    • 34548084364 scopus 로고    scopus 로고
    • Greensmith J, Aickelin U. Dendritic cells for SYN scan detection. In: Proceedings of the genetic and evolutionary computation conference (GECCO 2007); 2007. p. 49-56.
  • 8
    • 36749022987 scopus 로고    scopus 로고
    • Greensmith J, Aickelin U, Tedesco G. Information fusion and anomaly detection with the dendritic cell algorithm. Information Fusion, in press.
  • 10
    • 36749048891 scopus 로고    scopus 로고
    • Hofmeyr S, Forrest S. Immunity by design. In: Proceedings of GECCO; 1999. p. 1289-96.
  • 11
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr S., and Forrest S. Architecture for an artificial immune system. Evolutionary Computation 8 4 (2000) 443-473
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 12
    • 36749044484 scopus 로고    scopus 로고
    • Kim J, Bentley P. Evaluating negative selection in an artificial immune system for network intrusion detection. In: Proceedings of GECCO; July 2001. p. 1330-7.
  • 13
    • 33751021110 scopus 로고    scopus 로고
    • Kim J, Bentley P, Wallenta C, Ahmed M, Hailes S. Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm. In: ICARIS-06. LNCS, vol. 4163; 2006.
  • 14
    • 35449005874 scopus 로고    scopus 로고
    • Immune system approaches to intrusion detection - a review
    • 10.1007/s11047-006-9026-4
    • Kim J., Bentley P., Aickelin U., Greensmith J., Tedesco G., and Twycross J. Immune system approaches to intrusion detection - a review. Natural Computing 6 4 (2007) 413-466 10.1007/s11047-006-9026-4
    • (2007) Natural Computing , vol.6 , Issue.4 , pp. 413-466
    • Kim, J.1    Bentley, P.2    Aickelin, U.3    Greensmith, J.4    Tedesco, G.5    Twycross, J.6
  • 15
    • 0036715411 scopus 로고    scopus 로고
    • Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?
    • Lutz M.B., and Schuler G. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?. Trends in Immunology 23 9 (2002) 445-449
    • (2002) Trends in Immunology , vol.23 , Issue.9 , pp. 445-449
    • Lutz, M.B.1    Schuler, G.2
  • 16
    • 0028201732 scopus 로고
    • Tolerance, danger, and the extended family
    • Matzinger P. Tolerance, danger, and the extended family. Annual Review of Immunology 12 (1994) 991-1045
    • (1994) Annual Review of Immunology , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 17
    • 0037066502 scopus 로고    scopus 로고
    • Decoding the patterns of self and nonself by the innate immune system
    • Medzhitov R., and Janeway C.A. Decoding the patterns of self and nonself by the innate immune system. Science 296 (2002) 298-300
    • (2002) Science , vol.296 , pp. 298-300
    • Medzhitov, R.1    Janeway, C.A.2
  • 19
    • 36749017141 scopus 로고    scopus 로고
    • Oates R, Greensmith J, Aickelin U, Garibaldi J, Kendall G. The application of a dendritic cell algorithm to a robotic classifier. In: ICARIS 2007; 2007.
  • 21
    • 36749031908 scopus 로고    scopus 로고
    • Stibor T. On the appropriateness of negative selection for anomaly detection and network intrusion detection. PhD thesis. Germany: Darmstadt University of Technology; 2006.
  • 22
    • 36749027331 scopus 로고    scopus 로고
    • Twycross J. Integrated innate and adaptive artificial immune systems applied to process anomaly detection. PhD thesis. U.K.: School of Computer Science, University of Nottingham; 2007.
  • 23
    • 26944450016 scopus 로고    scopus 로고
    • Twycross J, Aickelin U. Towards a conceptual framework for innate immunity. In: ICARIS-05, Banff, Canada. LNCS, vol. 3627; 2005. p. 112-25.
  • 24
    • 34547268613 scopus 로고    scopus 로고
    • Twycross J, Aickelin U. libtissue - implementing innate immunity. In: CEC-06, Vancouver, Canada; July 2006. p. 499-506.
  • 25
    • 36749043383 scopus 로고    scopus 로고
    • Williams C, Harry R, McLeod J. Mechanisms of Apoptosis induced DC suppression. Immunology, in press. doi:10.1111/j.1365-2567.2007.02743.x.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.