2008
DOI: 10.1109/mci.2008.919069
|View full text |Cite
|
Sign up to set email alerts
|

Immunocomputing for intelligent intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 21 publications
0
12
0
1
Order By: Relevance
“…These advances of the IC approach together with its biologic nature probably mean a further step toward placing on the chip more of the functions of intelligent signal processing [34,45]. For example, this chip could be selfadapted to different types of signals (e.g., audio, video, sonar, radar, etc.)…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…These advances of the IC approach together with its biologic nature probably mean a further step toward placing on the chip more of the functions of intelligent signal processing [34,45]. For example, this chip could be selfadapted to different types of signals (e.g., audio, video, sonar, radar, etc.)…”
Section: Resultsmentioning
confidence: 99%
“…For example, an enhanced SVM for intrusion detection in [44] needs at least four steps to adopt KDD data [39]: (1) consider only binary classification, (2) filter the ''redundant'' intrusion records, (3) perform feature ranking and (4) delete the ''unimportant'' features. Note that FIN is free of similar steps and is applied directly to the same KDD data [45].…”
Section: Discussionmentioning
confidence: 99%
“…FIN proposes the generation of a Euclidean multidimensional space (FIN space) in which a training process based on application of a discrete tree transform (DTT) [1] and/or a singular value descomposition (SVD) [13] incorporates input data and its initial space, which is optimized to form a set of class representatives for representation called cytokines, following a process of apoptosis and immunization explained in [24]. These cytokines operate according to a proximity principle in the FIN space to determine the class of data reviewed when mapped in the space with the DTT algorithm.…”
Section: -Formal Immune Network (Fin)mentioning
confidence: 99%
“…It is precisely this difference of concepts that has given rise to a prolific and diverse set [4] of hybrid techniques collectively called Artificial Immune Systems [10]. All these proposals seek to rescue capacities of identification, threat elimination, failure tolerance and adaptability of Biological Immune Systems through a series of proposals such as Formal Immune Network (FIN) [24], which is based on programmed cell death and cytokine-controlled immunization (messenger proteins), Clonal Selection (CLONALG), which posits a proliferation of detectors capable of detecting antigens and exploring them in order to enhance affinity by means of somatic hypermutation [5], Negative Selection (LISYS) [9] which is based on the maturation of T lymphocytes to produce immunological tolerance [12] and models based on the Jerne immune network [3]. There is evidence that these techniques do not deal with the change of normality in a consistent manner, while they also rely on models that are partial and not fully accepted [28].…”
Section: Introductionmentioning
confidence: 99%
“…В последнее время появилось много работ, посвященных искусствен-ным иммунным системам. Искусственные иммунные системы (AISsArtificial immune systems) [65,71] и иммуннокомпьютинг (ICImmunocomputing) [130,131,142] часто воспринимаются исследовате-лями как интерпретация генетических алгоритмов [133] и искусствен-ных нейронных сетей (ANNs -Artificial neural networks), которые также называют нейрокомпьютингом [132].…”
unclassified