Danger Theory and Intelligent Data Processing

被引:0
|
作者
Iqbal, Anjum [1 ]
Maarof, Mohd Aizaini [1 ]
机构
[1] Univ Teknol Malaysia, Grp Artificial Immune Syst & Secur GAINS, Fac Comp Sci & Informat Syst, Utm Skudai 81310, Johor, Malaysia
关键词
artificial immune system; danger theory; intelligent processing; system calls;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Artificial Immune System (AIS) is relatively naive paradigm for intelligent computations. The inspiration for AIS is derived from natural Immune System (IS). Classically it is believed that IS strives to discriminate between self and non-self. Most of the existing AIS research is based on this approach. Danger Theory (DT) argues this approach and proposes that IS fights against danger producing elements and tolerates others. We, the computational researchers, are not concerned with the arguments among immunologists but try to extract from it novel abstractions for intelligent computation. This paper aims to follow DT inspiration for intelligent data processing. The approach may introduce new avenue in intelligent processing. The data used is system calls data that is potentially significant in intrusion detection applications.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [1] Intelligent detector and related algorithms based on immune danger theory
    Tan, Minsheng
    Bai, Yaohua
    Zhou, Huan
    Liu, Jianxue
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43 (05): : 17 - 22
  • [2] Intelligent big data processing
    Hsu, Ching-Hsien
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2014, 36 : 16 - 18
  • [3] New Data Cheer Champions of the Danger Theory
    Holzman, David C.
    [J]. JOURNAL OF THE NATIONAL CANCER INSTITUTE, 2010, 102 (02) : 76 - 78
  • [4] Intelligent Fraudulent Detection System Based SVM And Optimized By Danger Theory
    Rajak, Isha
    Mathai, K. James
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [5] No danger in Intelligent Design
    Dutch, SI
    [J]. GEOTIMES, 2000, 45 (11): : 7 - 7
  • [6] INTELLIGENT NMR DATA-PROCESSING
    DUMOULIN, CL
    BEGEMANN, J
    KAHN, W
    LEVY, GC
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1984, 188 (AUG): : 5 - ANYL
  • [7] Advances in secure and intelligent data processing
    Xhafa, Fatos
    Chen, Xiaofeng
    Huang, Xinyi
    Kolici, Vladi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1021 - 1022
  • [8] Agent framework for intelligent data processing
    Ramachandran, R
    Graves, S
    Movva, S
    Li, X
    [J]. IGARSS 2004: IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM PROCEEDINGS, VOLS 1-7: SCIENCE FOR SOCIETY: EXPLORING AND MANAGING A CHANGING PLANET, 2004, : 164 - 167
  • [9] Intelligent Processing of Intrusion Detection Data
    Duan, Tao
    Tian, Youhui
    Zhang, Hanrui
    Liu, Yaozong
    Li, Qianmu
    Jiang, Jian
    Shi, Zongsheng
    [J]. IEEE ACCESS, 2020, 8 : 78330 - 78342
  • [10] Intelligent processing based on data fusion
    He, FG
    Wang, JL
    [J]. ICEMI'2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOLS 1-3, 2003, : 95 - 99