메뉴 건너뛰기




Volumn 32, Issue 1-4, 2009, Pages 13-43

Intelligent agent based artificial immune system for computer security-a review

Author keywords

Agent based IDS; Artificial immune system; Computer security; Intrusion detection system; Network security

Indexed keywords

AGENT BASED; ARTIFICIAL IMMUNE SYSTEM; AUTOMATED CODE; COMPUTER SCIENTISTS; COMPUTER SECURITY; HUMAN BODIES; HUMAN IMMUNE SYSTEMS; INTELLIGENT AGENT TECHNOLOGY; INTERNET SECURITY SYSTEMS; RESEARCH CHALLENGES; SECURITY MECHANISM; STATE OF THE ART; TROJANS;

EID: 75149138866     PISSN: 02692821     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10462-009-9131-8     Document Type: Review
Times cited : (17)

References (32)
  • 1
    • 75149166684 scopus 로고    scopus 로고
    • An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD)
    • MR Ahmedi D Maleki 2008 An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD) IJCSNS Int J Comput Sci Netw Sec 8 4 160 169
    • (2008) IJCSNS Int J Comput Sci Netw Sec , vol.8 , Issue.4 , pp. 160-169
    • Ahmedi, M.R.1    Maleki, D.2
  • 3
    • 33751017631 scopus 로고    scopus 로고
    • Immune system approaches to intrusion detection-a review
    • Nicosia G et al (eds) Springer
    • Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection-a review. In: Nicosia G et al (eds) ICARIS 2004, LNCS 3239. Springer, pp 316-329
    • (2004) ICARIS 2004, LNCS , vol.3239 , pp. 316-329
    • Aickelin, U.1    Greensmith, J.2    Twycross, J.3
  • 5
    • 34548453089 scopus 로고    scopus 로고
    • An agent based and biological inspired real-time intrusion detection and security model for computer network operations
    • Elsevier
    • Boukerche A, Machado RB, Juca KRL, Sobral JBM, Notare MSMA (2007) An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput Commun (30), 2649-2660, Elsevier
    • (2007) Comput Commun , vol.30 , pp. 2649-2660
    • Boukerche, A.1    MacHado, R.B.2    Juca, K.R.L.3    Sobral, J.B.M.4    Msma, N.5
  • 7
    • 47749125439 scopus 로고    scopus 로고
    • Agent-based immunological intrusion detection system for mobile Ad-Hoc networks
    • Bubak M et al (eds) Springer
    • Byrski A, Carvalho M (2008) Agent-based immunological intrusion detection system for mobile Ad-Hoc networks. In: Bubak M et al (eds) ICCS 2008, Springer, pp 584-593
    • (2008) ICCS 2008 , pp. 584-593
    • Byrski, A.1    Carvalho, M.2
  • 8
    • 1142282727 scopus 로고    scopus 로고
    • (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
    • 10.1145/643477.643479
    • J Claessens B Preneel J Vandewalle 2003 (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions ACM Trans Int Technol 3 1 28 48 10.1145/643477.643479
    • (2003) ACM Trans Int Technol , vol.3 , Issue.1 , pp. 28-48
    • Claessens, J.1    Preneel, B.2    Vandewalle, J.3
  • 15
    • 0036613003 scopus 로고    scopus 로고
    • An artificial immune system architecture for computer security applications
    • DOI 10.1109/TEVC.2002.1011540, PII S1089778X02060691
    • PK Harmer PD Williams GH Gunsch GB Lamont 2002 An artificial immune system architecture for computer security applications IEEE Trans Evol Comput 6 3 252 280 10.1109/TEVC.2002.1011540 (Pubitemid 34867249)
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 252-280
    • Harmer, P.K.1    Williams, P.D.2    Gunsch, G.H.3    Lamont, G.B.4
  • 16
    • 78049441857 scopus 로고    scopus 로고
    • Next challenges in bringing artificial immune systems to production in network security
    • Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org
    • Hilker M (2008) Next challenges in bringing artificial immune systems to production in network security. In: Proceedings of BIONETICS, Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org
    • (2008) Proceedings of BIONETICS
    • Hilker, M.1
  • 18
    • 44849134799 scopus 로고    scopus 로고
    • The next generation of immunity-based systems: From specific recognition to computational intelligence
    • Springer, Berlin
    • Ishida Y (2008) The next generation of immunity-based systems: from specific recognition to computational intelligence. Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091-1121
    • (2008) Studies in Computational Intelligence (SCI) , vol.115 , pp. 1091-1121
    • Ishida, Y.1
  • 21
    • 33751362999 scopus 로고    scopus 로고
    • Immune multi-agent active defense model for network intrusion
    • Wang et al (eds) Springer
    • Liu S, Li T, Wang D, Zhao K, Gong X, Hu X, Xu C, Liang G (2006) Immune multi-agent active defense model for network intrusion. In: Wang et al (eds) SEAL 2006, LNCS 4247, Springer, pp 104-111
    • (2006) SEAL 2006, LNCS , vol.4247 , pp. 104-111
    • Liu, S.1    Li, T.2    Wang, D.3    Zhao, K.4    Gong, X.5    Hu, X.6    Xu, C.7    Liang, G.8
  • 22
    • 33947601959 scopus 로고    scopus 로고
    • Multi-agent network intrusion active defense model based on immune theory, Wuhan University
    • S Liu T Li D Wang X Hu C Xu 2007 Multi-agent network intrusion active defense model based on immune theory, Wuhan University J Nat Sci 12 1 167 171
    • (2007) J Nat Sci , vol.12 , Issue.1 , pp. 167-171
    • Liu, S.1    Li, T.2    Wang, D.3    Hu, X.4    Xu, C.5
  • 23
    • 38349068770 scopus 로고    scopus 로고
    • A cooperative AIS framework for intrusion detection
    • DOI 10.1109/ICC.2007.237, 4288908, 2007 IEEE International Conference on Communications, ICC'07
    • Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative AIS framework for intrusiondetection. In: Proceedings of the international conference on communications, Glasgow, pp 1409-1416, doi: 10.1109/ICC.2007.237 (Pubitemid 351145733)
    • (2007) IEEE International Conference on Communications , pp. 1409-1416
    • Luther, K.1    Bye, R.2    Alpcan, T.3    Muller, A.4    Albayrak, S.5
  • 25
    • 38049096241 scopus 로고    scopus 로고
    • Framework of an immunity-based anomaly detection system for user behavior
    • Apolloni B et al (eds)
    • Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: Apolloni B et al (eds) KES 2007/ WIRN 2007, LNAI 4694, Springer, pp 821-829
    • (2007) KES 2007/ WIRN 2007, LNAI 4694, Springer , pp. 821-829
    • Okamoto, T.1    Ishida, Y.2
  • 26
    • 33745884161 scopus 로고    scopus 로고
    • Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems
    • Watanabe Y, lshida Y (2004) Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. In: Proceedings of artificial life robotics (ISAROB, 2004), vol 8, pp 163-167
    • (2004) Proceedings of Artificial Life Robotics (ISAROB, 2004) , vol.8 , pp. 163-167
    • Watanabe, Y.1    Lshida, Y.2
  • 27
    • 51849128962 scopus 로고    scopus 로고
    • Computer security: A survey of methods and systems
    • 10.3844/jcssp.2007.478.486
    • RV Yampolskiy V Govindaraju 2007 Computer security: a survey of methods and systems J Comput Sci 3 7 478 486 10.3844/jcssp.2007.478.486
    • (2007) J Comput Sci , vol.3 , Issue.7 , pp. 478-486
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 28
    • 59349106158 scopus 로고    scopus 로고
    • Distributed agents model for intrusion detection based on AIS
    • Elsevier
    • Yang J, Liu XJ, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowledge-based systems 22(2):115-119, Elsevier
    • (2009) Knowledge-based Systems , vol.22 , Issue.2 , pp. 115-119
    • Yang, J.1    Liu, X.J.2    Li, T.3    Liang, G.4    Liu, S.5
  • 29
    • 33646825370 scopus 로고    scopus 로고
    • An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks
    • Hao Y et al (eds) Springer
    • Yeom K-W, Park J-H (2005) An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks. In: Hao Y et al (eds) CIS 2005, Springer, pp 204-211
    • (2005) CIS 2005 , pp. 204-211
    • Yeom, K.-W.1    Park, J.-H.2
  • 30
    • 33947317430 scopus 로고    scopus 로고
    • Artificial immune system inspired behavior-based anti-spam filter
    • Springer
    • Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729-740, Springer
    • (2006) Soft Comput , vol.11 , pp. 729-740
    • Yue, X.1    Abraham, A.2    Chi, Z.-X.3    Hao, Y.-Y.4    Mo, H.5
  • 31
    • 33847171030 scopus 로고    scopus 로고
    • Designing abstract immune mobile agents for distributed intrusion detection
    • ICNN&B '05, Beijing doi: 10.1109/ICNNB.2005.1614734
    • Zhang Z, Luo W, Wang X (2005) Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B '05, Beijing, (2):748-753. doi: 10.1109/ICNNB.2005.1614734
    • (2005) Proceedings of the International Conference on Neural Networks and Brain , Issue.2 , pp. 748-753
    • Zhang, Z.1    Luo, W.2    Wang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.