Uwe Aickelin
Sensing Danger: Innate Immunology for Intrusion Detection
Aickelin, Uwe; Greensmith, Julie
Abstract
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms
Citation
Aickelin, U., & Greensmith, J. (2007). Sensing Danger: Innate Immunology for Intrusion Detection. Information Security Technical Report, 12(4), 218-227. https://doi.org/10.1016/j.istr.2007.10.003
Journal Article Type | Article |
---|---|
Online Publication Date | Oct 22, 2007 |
Publication Date | Oct 22, 2007 |
Deposit Date | Oct 2, 2007 |
Publicly Available Date | Nov 9, 2007 |
Journal | Information Security Technical Report |
Print ISSN | 1363-4127 |
Electronic ISSN | 1363-4127 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 12 |
Issue | 4 |
Pages | 218-227 |
DOI | https://doi.org/10.1016/j.istr.2007.10.003 |
Keywords | immunology, innate immunology, intrusion detection, |
Public URL | https://nottingham-repository.worktribe.com/output/1017122 |
Publisher URL | https://www.sciencedirect.com/science/article/pii/S1363412707000544 |
Files
07eistr_danger.pdf
(566 Kb)
PDF
You might also like
Further Exploration of Necrotic Control of Evolved Art
(2020)
Presentation / Conference Contribution
Necrotic Control of the Aesthetics of Evolved Art
(2020)
Presentation / Conference Contribution
Migration threshold tuning in the deterministic dendritic cell algorithm
(2019)
Book Chapter
The Functional Dendritic Cell Algorithm: A formal specification with Haskell
(2017)
Presentation / Conference Contribution
Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems
(2016)
Presentation / Conference Contribution
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search