Immune system approaches to intrusion detection–a review

J Kim, PJ Bentley, U Aickelin, J Greensmith… - Natural computing, 2007 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …

An overview of artificial immune systems

J Timmis, T Knight, LN de Castro, E Hart - Computation in cells and …, 2004 - Springer
The immune system is highly distributed, highly adaptive, self-organising in nature,
maintains a memory of past encounters and has the ability to continually learn about new …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

[PDF][PDF] Data mining approaches for intrusion detection

W Lee, S Stolfo - 1998 - usenix.org
In this paper we discuss our research in developing general and systematic methods for
intrusion detection. The key ideas are to use data mining techniques to discover consistent …

Computer immune system and method for detecting unwanted code in a computer system

PAJ van der Made - US Patent 7,093,239, 2006 - Google Patents
US PATENT DOCUMENTS the computer system. An initial analysis may be performed on
the behavior pattern to identify infected programs on initial presentation of the program to the …

Automated sample creation of polymorphic and non-polymorphic marcro viruses

JMY Boulay, AT Petrillo, MG Swimmer - US Patent 6,108,799, 2000 - Google Patents
Disclosed is a System and method for automatically gener ating at least one instance of a
computer macro virus that is native to or associated with an application. The method …

An artificial immune system architecture for computer security applications

PK Harmer, PD Williams, GH Gunsch… - IEEE transactions on …, 2002 - ieeexplore.ieee.org
With increased global interconnectivity and reliance on e-commerce, network services and
Internet communication, computer security has become a necessity. Organizations must …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

Analytical virtual machine

PAJ van der Made - US Patent 7,657,419, 2010 - Google Patents
An analytical virtual machine (AVM) analyzes computer code using a software processor
including a register that stores behavior flags indicative of behaviors identified by virtually …

Detecting anomalous network traffic with self-organizing maps

M Ramadas, S Ostermann, B Tjaden - International Workshop on Recent …, 2003 - Springer
Abstract Integrated Network-Based Ohio University Network Detective Service (INBOUNDS)
is a network based intrusion detection system being developed at Ohio University. The …