2014
DOI: 10.46298/arima.1974
|View full text |Cite
|
Sign up to set email alerts
|

Immunological Approach for Intrusion Detection

Abstract: International audience One of the central challenges with computer security is determining the difference between normal and potentially harmful behavior. For decades, developers have protected their systems using classical methods. However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensive tools. Promising solutions are emerging with biological inspired computing, and in particular, the immunological approach. In this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Zekri and Souici-Meslati [73] proposed two algorithms: the frst one was based on the DT (DCA) and the second one was based on a Negative Selection algorithm (NSA) to detect intrusions. The DCA has raised no false alarms while the NSA issued a large number of those, rendering it unreliable and inadequate for anomaly-based detection.…”
Section: Artificial Immune Systemsmentioning
confidence: 99%
“…Zekri and Souici-Meslati [73] proposed two algorithms: the frst one was based on the DT (DCA) and the second one was based on a Negative Selection algorithm (NSA) to detect intrusions. The DCA has raised no false alarms while the NSA issued a large number of those, rendering it unreliable and inadequate for anomaly-based detection.…”
Section: Artificial Immune Systemsmentioning
confidence: 99%