Skip to main content
Article thumbnail
Location of Repository

'Immune System Approaches to Intrusion Detection - A Review'

By Uwe Aickelin, Julie Greensmith and Jamie Twycross

Abstract

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research

Publisher: Springer - Verlag
Year: 2004
OAI identifier: oai:eprints.nottingham.ac.uk:272
Provided by: Nottingham ePrints

Suggested articles

Citations

  1. (1994). A biologically inspired immune system for computers.
  2. (1992). A real-time intrusion detection expert system (ides) - final technical report.
  3. (2003). A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). Integrated Network Management,
  4. (1996). A sense of self for unix processes.
  5. (2003). An artificial immune system approach to misbehavior detection in mobile ad-hoc networks.
  6. (2003). An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. doi
  7. (1999). An artificial immune system for network intrusion detection.
  8. (2002). An immunity-based technique to characterize intrusions in computer networks.
  9. (1999). An immunological model of distributed detection and its application to computer security.
  10. An innate sense of danger.
  11. (2000). and A Wespi. vised taxonomy of intrusion-detection systems.
  12. (2003). Anomaly detection using real-valued negative selection.
  13. (2002). Artificial Immune Systems: A New Computational Intelligence Approach.
  14. (2001). Cdis: Towards a computer immune system for detecting network intrusions.
  15. (1998). Computer immunology.
  16. (2002). Coverage and generaliszation in an artificial immune system.
  17. (2003). Danger theory: The link between ais and ids.
  18. (1999). dataset. MIT Lincoln Labs,
  19. Evaluating negative selection in an artificial immune system for network intrusion detection.
  20. (2003). Firestorm network intrusion detection system. Firestorm Documentation,
  21. (1999). Immunity by design.
  22. (1997). Immunity-based systems: A survey.
  23. (1996). Information exploration shootout or benchmarks for information exploration.
  24. (2002). Integrating Artificial Immune Algorithms for Intrusion Detection.
  25. (2001). Intrusion detection systems.
  26. (1998). Intrusion detection using sequences of system calls.
  27. Network Intrusion Detection. New Riders,
  28. (1996). Novelty detection in time series data using ideas from immunology.
  29. (2002). Operating System Stability and Security Through Process Homeostasis.
  30. (2002). Revisiting lisys: Parameters and normal behaviour.
  31. (1994). Selfnonself discrimination in a computer.
  32. (2003). Snort users manual snort release: 2.0.1. Snort Documentation,
  33. (1974). Towards a network theory of the immune system.
  34. (2001). Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.