74,302 research outputs found
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
INTRODUCTION
In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become
increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement.
Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security,
have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high
level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will
improve the performance of real intrusion detection systems.
This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested
An artificial immune system for fuzzy-rule induction in data mining
This work proposes a classification-rule discovery algorithm integrating artificial immune systems and fuzzy systems. The algorithm consists of two parts: a sequential covering procedure and a rule evolution procedure. Each antibody (candidate solution) corresponds to a classification rule. The classification of new examples (antigens) considers not only the fitness of a fuzzy rule based on the entire training set, but also the affinity between the rule and the new example. This affinity must be greater than a threshold in order for the fuzzy rule to be activated, and it is proposed an adaptive procedure for computing this threshold for each rule. This paper reports results for the proposed algorithm in several data sets. Results are analyzed with respect to both predictive accuracy and rule set simplicity, and are compared with C4.5rules, a very popular data mining algorithm
- …