2012
DOI: 10.1007/978-3-642-33757-4_14
|View full text |Cite
|
Sign up to set email alerts
|

A Negative Selection Approach to Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…However, its impact in the anomaly detection performance of the algorithm is also reduced provided f is not too small (see S9 Fig). The f parameter was first introduced in [58] to take into account knowledge of the typical pairing durations observed in the calibration stage. Since detection mechanisms involve the number of long lived pairings, it could be expected that only those agents performing the longest pairings should be considered.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, its impact in the anomaly detection performance of the algorithm is also reduced provided f is not too small (see S9 Fig). The f parameter was first introduced in [58] to take into account knowledge of the typical pairing durations observed in the calibration stage. Since detection mechanisms involve the number of long lived pairings, it could be expected that only those agents performing the longest pairings should be considered.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, the algorithm proposed here reduced the complexity in initial proposals [3, 43, 58] by eliminating the need of using the calibration stage and by reducing the number of parameters that one should tune to only one. It should be mentioned, however, that these conclusions are restricted to semi-supervised anomaly detection applications with stationary data.…”
Section: Discussionmentioning
confidence: 99%
“…Methods based on negative/positive selection are typically used for classification and pattern recognition problems (e.g., anomaly detection [ 109 ]). In anomaly-based IDS, the pathogens represent the potential attacks, and the antibodies are a way to identify that attacks [ 110 ].…”
Section: Classical Ais Theories and Their Applicationsmentioning
confidence: 99%
“…Anomaly detection technique behavior is quite old, it is also used to detect suspicious behavior in telephony. The main idea is to model, during a learning period, the "normal" behavior of a system/program/user, defining a line of conduct (profile), and then considering (detection phase) as suspect any unusual behavior (significant deviations compared to the model of "normal" behavior) [20].…”
Section: Intrusion Detectionmentioning
confidence: 99%