Show simple item record

dc.contributor.authorMiddlemiss, Melanieen_NZ
dc.date.available2011-04-07T03:05:13Z
dc.date.copyright2005-07en_NZ
dc.identifier.citationMiddlemiss, M. (2005). Framework for intrusion detection inspired by the immune system (Information Science Discussion Papers Series No. 2005/07). University of Otago. Retrieved from http://hdl.handle.net/10523/851en
dc.identifier.urihttp://hdl.handle.net/10523/851
dc.description.abstractThe immune system is a complex and distributed system. It provides a multilevel form of defence, capable of identifying and reacting to harmful pathogens that it does not recognise as being part of its “self”. The framework proposed in this paper incorporates a number of immunological principles, including the multilevel defence and the cooperation between cells in the adaptive immune system. It is proposed that this approach could be used to provide a high level of intrusion detection, while minimising the level of false negative detections.en_NZ
dc.format.mimetypeapplication/pdf
dc.publisherUniversity of Otagoen_NZ
dc.relation.ispartofseriesInformation Science Discussion Papers Seriesen_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titleFramework for intrusion detection inspired by the immune systemen_NZ
dc.typeDiscussion Paperen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages16en_NZ
otago.date.accession2005-12-02en_NZ
otago.schoolInformation Scienceen_NZ
otago.openaccessOpen
otago.place.publicationDunedin, New Zealanden_NZ
dc.identifier.eprints21en_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesJackson, K.: Intrusion detection system product survey. Research report LA-UR-99-3883, Los Alamos National Laboratory (1999) Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press (1994) 202–212 Forrest, S., Hofmeyr, S., Somayaji, A.: Computer immunology. Communications of the ACM 40 (1997) 88–96 Kim, J., Bentley, P.: Negative selection and niching by an artificial immune system for network intrusion detection. In Brave, S., Wu, A.S., eds.: Late Breaking Papers at the 1999 Genetic and Evolutionary Computation Conference, Orlando, Florida, USA (1999) 149–158 Kephart, J.O.: A biologically inspired immune system for computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, Cambridge, MA, US, MIT Press (1994) 130–139 Playfair, J.H.L.: Infection and immunity. Oxford University Press, Oxford ; New York (1995) Dasgupta, D., Yu, S.: Artificial immune systems: A bibliography. CS Technical Report CS-03-002, Computer Science Division, The University of Memphis, USA (2003) de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Combutational Intelligence Approach. Springer-Verlag (2002) Dasgupta, D., Ji, Z., Gonzalez, F.: Artificial immune system (AIS) research in the last five years. In Sarker, R., Reynolds, R., Abbass, H., Tan, K.C., McKay, R., Essam, D., Gedeon, T., eds.: Congress on Evolutionary Computation, Canberra, Australia, IEEE Press (8-12 Dec 2003) 123–130 Bace, R., Mell, P.: Intrusion detection systems. Special Publication SP 800-31, Computer Security Division of the Information Technology Laboratory, National Institute of Standards and Technology (2001) Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In Jordan, M., Kearns, M., Solla, S., eds.: Advances in Neural Information Processing Systems. Volume 10. The MIT Press (1998) Ranum, M.: Intrusion detection: Ideals, expectations and realities. Computer Security Journal XV (1999) Sundaram, A.: An introduction to intrusion detection. Crossroads, The ACM Student Magazine, http://www.acm.org/crossroads/xrds2-4/intrus.html (1996) Axelsson, S.: On a difficulty of intrusion detection. In: RAID’99: Second International Workshop on the Recent Advances in Intrusion Detection, Purdue University, West Lafayette, Indiana, USA (1999) Janeway, C., Travers, P.: Immunobiology : the immune system in health and disease. 5th edn. Current Biology ; Garland Pub., London ; San Francisco New York (2001) Sompayrac, L.: How the immune system works. 2nd edn. Blackwell Science, Malden, Mass. (2003) Hannigan, B.: Immunology. Biomedical Sciences Explained. Arnold, London (2000) Weir, D.M., Stewart, J.: Immunology. 8 edn. Churchill Livingstone, Medical Division of Longman Group Limited, New York (1997) Dasgupta, D.: Artificial Immune Systems and Their Applications. Springer Verlag (1998) Northcutt, S., Zeltser, L., Winters, S., Frederick, K.K., Ritchey, R.W.: Inside Network Perimeter Security. New Riders (2003) The MITRE Corporation: Common vulnerabilities and exposures list, http://cve.mitre.org/ (2002) Kim, J., Ong, A., Overill, R.E.: Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. In Sarker, R., et. al., eds.: Congress on Evolutionary Computation, Canberra, Australia, IEEE Press (2003) 405–412 Decker, J.M.: Introduction to Immunology. 11th Hour Series. Blackwell Science (2000) Dasgupta, D., Yu, S., Majumdar, N.S.: MILA - multilevel immune learning algorithm. In Cantu-Paz, E., et. al., eds.: Genetic and Evolutionary Computation Conference, Chicago, USA, Springer-Verlag (2003) 183–194 Campbell, N.A., Reece, J.B., Krebs, C.J.: Biology. 6th edn. Addison world student series. Benjamin Cummings, San Francisco [Calif.] (2002)en_NZ
otago.relation.number2005/07en_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record