A Survey of Artificial Immune System Based Intrusion Detection
نویسندگان
چکیده
منابع مشابه
A Survey of Artificial Immune System Based Intrusion Detection
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods...
متن کاملIntrusion Detection via Artificial Immune System: a Performance-based Approach
In this paper, we discuss the design and engineering of a biologicallyinspired, host-based intrusion detection system to protect computer networks. To this end, we have implemented an Artificial Immune System (AIS) that mimics the behavior of the biological adaptive immune system. The proposed AIS, consists of a number of running artificial white blood cells, which search, recognize, store and ...
متن کاملArtificial Immune System based General Purpose Intrusion Detection System
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...
متن کاملArtificial Neural Network based Intrusion Detection System: A Survey
Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly based IDS can play a very important role in this case. In the first part of this paper, we will focus on how ANN is recently used to address these issues. Number of the researchers has already shown the importance of the various Artificial Neural Network (ANN) based techniques for anomaly detectio...
متن کاملArtificial Immune System for Intrusion Detection
One of the central challenges with computer security is determining the difference between normal and potentially harmful activity. For decades, developers have protected their systems using classical methods. However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensives tools. Promising solutions are emerging with bio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Scientific World Journal
سال: 2014
ISSN: 2356-6140,1537-744X
DOI: 10.1155/2014/156790