Immune system approaches to intrusion detection - A review

被引:0
|
作者
Aickelin, U [1 ]
Greensmith, J [1 ]
Twycross, J [1 ]
机构
[1] Univ Nottingham, Sch Comp Sci, Nottingham NG7 2RD, England
来源
关键词
artificial immune systems; intrusion detection systems; literature review;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.
引用
收藏
页码:316 / 329
页数:14
相关论文
共 50 条
  • [41] A new intrusion detection method based on artificial immune system
    Wang, Baoyi
    Zhang, Shaomin
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 91 - 98
  • [42] Distributed intrusion detection system based on optimized immune algorithm
    Qiao, PL
    Su, J
    Sun, CW
    [J]. ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2, 2005, : 377 - 383
  • [43] An Intrusion Detection Method Using Artificial Immune System Approach
    Lyngdoh, Juniorika
    Hussain, Md Iftekhar
    Majaw, Suktilang
    Kalita, Hemanta Kumar
    [J]. ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 379 - 387
  • [44] An Immune Multi-agent System for Network Intrusion Detection
    Wang, Dian Gang
    Li, Tao
    Liu, Sun Jun
    Liang, Gang
    Zhao, Kui
    [J]. ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 436 - 445
  • [45] Using Artificial Immune System on Implementation of Intrusion Detection Systems
    EshghiShargh, Aref
    [J]. 2009 THIRD UKSIM EUROPEAN SYMPOSIUM ON COMPUTER MODELING AND SIMULATION (EMS 2009), 2009, : 164 - 168
  • [46] A hybrid immune intrusion detection system based on mobile agent
    Zhou, Xuanwu
    Yang, Xiaoyuan
    Wei, Ping
    Hu, Yupu
    [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 844 - 848
  • [47] An architecture for intrusion detection modeled after the human immune system
    Hall, JM
    Frincke, DA
    [J]. CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 75 - 78
  • [48] Immune Mobile Agent and Its Application in Intrusion Detection System
    Li, Yongzhong
    Jing, Chunwei
    Xu, Jing
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 42 - 45
  • [49] A Review of Classification Approaches Using Support Vector Machine in Intrusion Detection
    Kausar, Noreen
    Samir, Brahim Belhaouari
    Abdullah, Azween
    Ahmad, Iftikhar
    Hussain, Mohammad
    [J]. INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT III, 2011, 253 : 24 - +
  • [50] Artificial immune system based intrusion detection: anomaly detection and feature selection
    Abas, Eman Abd El Raoof
    Abdelkader, Hatem
    Keshk, Arabi
    [J]. 2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 542 - 546