Immune system approaches to intrusion detection–a review
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …
reasons. First, the human immune system provides the human body with a high level of …
An overview of artificial immune systems
The immune system is highly distributed, highly adaptive, self-organising in nature,
maintains a memory of past encounters and has the ability to continually learn about new …
maintains a memory of past encounters and has the ability to continually learn about new …
[图书][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
[PDF][PDF] Data mining approaches for intrusion detection
In this paper we discuss our research in developing general and systematic methods for
intrusion detection. The key ideas are to use data mining techniques to discover consistent …
intrusion detection. The key ideas are to use data mining techniques to discover consistent …
Computer immune system and method for detecting unwanted code in a computer system
PAJ van der Made - US Patent 7,093,239, 2006 - Google Patents
US PATENT DOCUMENTS the computer system. An initial analysis may be performed on
the behavior pattern to identify infected programs on initial presentation of the program to the …
the behavior pattern to identify infected programs on initial presentation of the program to the …
Automated sample creation of polymorphic and non-polymorphic marcro viruses
JMY Boulay, AT Petrillo, MG Swimmer - US Patent 6,108,799, 2000 - Google Patents
Disclosed is a System and method for automatically gener ating at least one instance of a
computer macro virus that is native to or associated with an application. The method …
computer macro virus that is native to or associated with an application. The method …
An artificial immune system architecture for computer security applications
PK Harmer, PD Williams, GH Gunsch… - IEEE transactions on …, 2002 - ieeexplore.ieee.org
With increased global interconnectivity and reliance on e-commerce, network services and
Internet communication, computer security has become a necessity. Organizations must …
Internet communication, computer security has become a necessity. Organizations must …
[图书][B] Immunological computation: theory and applications
D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
Analytical virtual machine
PAJ van der Made - US Patent 7,657,419, 2010 - Google Patents
An analytical virtual machine (AVM) analyzes computer code using a software processor
including a register that stores behavior flags indicative of behaviors identified by virtually …
including a register that stores behavior flags indicative of behaviors identified by virtually …
Detecting anomalous network traffic with self-organizing maps
M Ramadas, S Ostermann, B Tjaden - International Workshop on Recent …, 2003 - Springer
Abstract Integrated Network-Based Ohio University Network Detective Service (INBOUNDS)
is a network based intrusion detection system being developed at Ohio University. The …
is a network based intrusion detection system being developed at Ohio University. The …