Immune System Approaches to Intrusion Detection - A Review (ICARIS)

05/30/2013
by   Uwe Aickelin, et al.
0

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/03/2010

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

In recent years computer systems have become increasingly complex and co...
research
08/16/2022

Designing an Artificial Immune System inspired Intrusion Detection System

The Human Immune System (HIS) works to protect a body from infection, il...
research
08/05/2016

Self-Organising Maps in Computer Security

Some argue that biologically inspired algorithms are the future of solvi...
research
05/31/2013

The Dendritic Cell Algorithm for Intrusion Detection

As one of the solutions to intrusion detection problems, Artificial Immu...
research
01/27/2020

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

The identification of cyberattacks which target information and communic...
research
01/20/2022

NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions

The Host-Based Intrusion Detection Systems (HIDS) are widely used for de...
research
04/19/2023

Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review

Globally, the external Internet is increasingly being connected to the c...

Please sign up or login with your details

Forgot password? Click here to reset