Skip to main content
Article thumbnail
Location of Repository

'Immune System Approaches to Intrusion Detection - A Review'

By Uwe Aickelin, Julie Greensmith and Jamie Twycross

Abstract

Abstract. The use of artificial immune systems in intrusion detection is \ud an appealing concept for two reasons. Firstly, the human immune system \ud provides the human body with a high level of protection from invading \ud pathogens, in a robust, self-organised and distributed manner. Secondly, \ud current techniques used in computer security are not able to cope with \ud the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research

Publisher: Springer - Verlag
Year: 2004
OAI identifier: oai:eprints.nottingham.ac.uk:619
Provided by: Nottingham ePrints

Suggested articles

Citations

  1. (1994). A biologically inspired immune system for computers.
  2. (2003). A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). Integrated Network Management,
  3. (2003). An artificial immune system approach to misbehavior detection in mobile ad-hoc networks.
  4. (2002). An immunity-based technique to characterize intrusions in computer networks.
  5. (1999). An immunological model of distributed detection and its application to computer security.
  6. (2000). and A Wespi. vised taxonomy of intrusion-detection systems.
  7. (2003). Anomaly detection using real-valued negative selection.
  8. (2002). Artificial Immune Systems: A New Computational Intelligence Approach.
  9. (1998). Computer immunology.
  10. (2002). Coverage and generaliszation in an artificial immune system.
  11. (2003). Danger theory: The link between ais and ids.
  12. Evaluating negative selection in an artificial immune system for network intrusion detection.
  13. (1999). Immunity by design.
  14. (1997). Immunity-based systems: A survey.
  15. (1996). Information exploration shootout or benchmarks for information exploration.
  16. (1998). Intrusion detection using sequences of system calls.
  17. (1996). Novelty detection in time series data using ideas from immunology.
  18. (2002). Revisiting lisys: Parameters and normal behaviour.
  19. (1994). Selfnonself discrimination in a computer.
  20. (1974). Towards a network theory of the immune system.
  21. (2001). Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.