The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger model theory is a hypothesis of artificial immune systems. This hypothesis explains what is malicious from the trend of behaviors in a computer system. This paper presented a novel idea that malicious...
Recent years have seen a growing interest in computational methods based upon natural phenomena with biologically inspired techniques. The use of immune mechanisms in intrusion detection is an appealing concept. This paper reviews and assesses the analogy between the human immune system and intrusion detection systems. We show how immune metaphors can be used efficiently to build intrusion detection...
An artificial immune system (ARTIS) enlightened by the biological immune system is emerging as a new field of computation intelligence research. At present, it showed us many properties after the research to the immune system, including distributed computation, self-organization and lightweight, which were discovered to meet the requests of ARTIS. So the Immunology applied to the intrusion detection...
In this paper we analyze network immunity as a bio-inspired approach for detecting anomalies in communication networks. We briefly review the basic methods of artificial immune systems (AIS), identify their strengths and weaknesses, and evaluate their possible applications to intrusion detection in computer networks. After an overview of related work from the area of intrusion detection we collect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.