2004
DOI: 10.2139/ssrn.2832042
|View full text |Cite
|
Sign up to set email alerts
|

Danger Theory: The Link between AIS and IDS?

Abstract: We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and ada… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
140
0
1

Year Published

2005
2005
2013
2013

Publication Types

Select...
5
4

Relationship

5
4

Authors

Journals

citations
Cited by 98 publications
(141 citation statements)
references
References 27 publications
0
140
0
1
Order By: Relevance
“…In this model we replace the negative selection module in our previous model in [2] with a new one. In the new negative selection module instead of using only normal profile to distinguish and classified packets into two different classes of "Normal" and "Anomaly", we do future process on each packet using our expert rules, produced before based on the normal profile table.…”
Section: A Model Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this model we replace the negative selection module in our previous model in [2] with a new one. In the new negative selection module instead of using only normal profile to distinguish and classified packets into two different classes of "Normal" and "Anomaly", we do future process on each packet using our expert rules, produced before based on the normal profile table.…”
Section: A Model Detailsmentioning
confidence: 99%
“…Artificial immune system can use biological immune theoretic for references to search and design relevant models and algorithms to solve the various problems occurred in the field of computer security [2].…”
Section: Introductionmentioning
confidence: 99%
“…According to their evaluation, the danger signal greatly reduced the number of false positives [64]. However, the majority of publications on the use of the danger theory in AIS have been produced by its most outspoken proponents, Aickelin et al [62,65,66].…”
Section: Danger Signalsmentioning
confidence: 99%
“…For this purpose the "libtissue" [9,10] AIS framework, a product of a danger theory project [1], will model a number of innate immune system components such as dendritic cells in order to direct an adaptive T-cell based response. Dendritic cells will carry the responsibility of discerning dangerous and safe contexts as well as carrying out their role of presenting antigen and signals to a population of T-cells as in [4].…”
Section: The Algorithmmentioning
confidence: 99%