2017
DOI: 10.1016/j.jisa.2017.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Applications of artificial immune systems to computer security: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
29
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(29 citation statements)
references
References 37 publications
0
29
0
Order By: Relevance
“…Currently, in a similar way as GAs are inspired by organic evolution (i.e., Darwinian evolution), the artificial immune system (AIS) algorithms [5][6][7][8][9][10] are inspired by the immune system of vertebrates. These algorithms share some of the characteristics of the GAs, and they are currently used for solving practical problems [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, in a similar way as GAs are inspired by organic evolution (i.e., Darwinian evolution), the artificial immune system (AIS) algorithms [5][6][7][8][9][10] are inspired by the immune system of vertebrates. These algorithms share some of the characteristics of the GAs, and they are currently used for solving practical problems [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…The reputational and financial damages are just catastrophic for both organizations and governments. A class of security solutions that has attracted researchers over the last twenty years consists of enabling software applications to become immune against attacks [1][2][3][4]. This is a challenging area as it integrates several domains including anomaly-based intrusion detection and prevention [5][6][7][8][9][10][11], application partitioning and sandboxing [12][13][14][15], automatic error detection and patching [3,4], as well as collaborative application communities [1,16,17].…”
Section: Introductionmentioning
confidence: 99%
“…(4) When the behavioral model is learned: before program execution (statically) [11] or during program execution (dynamically) [6,10,18]; and (5) How the model is constructed: finite state automaton [6,10,11,18], or machine learning including supervised [2,19], semi-supervised and unsupervised learning.…”
Section: Introductionmentioning
confidence: 99%
“…The immune system is responsible for guarding the human body against the foreign and dangerous microorganisms called pathogens. To overcome these pathogens, the immune system depends on innate and adaptive immune subsystems [3]. The innate immune subsystem is considered the immutable first line of defense for alarming danger signals around suspicious item.…”
Section: Introductionmentioning
confidence: 99%