2015
DOI: 10.1162/artl_a_00162
|View full text |Cite
|
Sign up to set email alerts
|

An Artificial Bioindicator System for Network Intrusion Detection

Abstract: An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…The ABS (Blum et al [3]) was built under an ecological point of view, from the BIS and tested in a cybersecurity scenario. In this context, ABS deals with the problem of network intrusion detection.…”
Section: The Abs Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The ABS (Blum et al [3]) was built under an ecological point of view, from the BIS and tested in a cybersecurity scenario. In this context, ABS deals with the problem of network intrusion detection.…”
Section: The Abs Modelmentioning
confidence: 99%
“…We consider a set of binary characteristics extracted from headers of the Transport and Network layer of (TCP-UDP)/IP connections. We also consider SANS reference over the most attacked service ports for individualizing some critical services [3]. The selection of these characteristics is justified because they are used by ABS and allow a fair comparison between the algorithms.…”
Section: R-abs Over Cybersecurity Domainmentioning
confidence: 99%
See 2 more Smart Citations
“…Jamali and Fotohi [37] proposed to combat wormhole attacks by applying immune network theory. Blum et al [38] proposed a network intrusion detection based on immune network theory. In these efforts, the immune network theory has adequately verified the detection of abnormal data.…”
Section: B Prefix Hijacking Detection Technologymentioning
confidence: 99%