Skip to main content

Research Repository

See what's under the surface

Advanced Search

An Immune Inspired Approach to Anomaly Detection

Twycross, Jamie; Aickelin, Uwe

Authors

Jamie Twycross

Uwe Aickelin



Abstract

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was due to these artificial systems being based on too simplistic a view of the immune system. We present here a second generation artificial immune system for process anomaly detection. It improves on earlier systems by having different artificial cell types that process information. Following detailed information about how to build such second generation systems, we find that communication between cells types is key to performance. Through realistic testing and validation we show that second generation artificial immune systems are capable of anomaly detection beyond generic system policies. The paper concludes with a discussion and outline of the next steps in this exciting area of computer security.

Peer Reviewed Peer Reviewed
Book Title Handbook of Research on Information Assurance and Security
APA6 Citation Twycross, J., & Aickelin, U. An Immune Inspired Approach to Anomaly Detection. In Handbook of Research on Information Assurance and SecurityIDEAS Publishing
Copyright Statement Copyright information regarding this work can be found at the following address: http://eprints.nottingh.../end_user_agreement.pdf

Files

07hrias_chapter.pdf (289 Kb)
PDF

Copyright Statement
Copyright information regarding this work can be found at the following address: http://eprints.nottingham.ac.uk/end_user_agreement.pdf





You might also like



Downloadable Citations

;