2019
DOI: 10.4018/ijitn.2019040104
|View full text |Cite
|
Sign up to set email alerts
|

Modeling an Intrusion Detection System Based on Adaptive Immunology

Abstract: Network security has always has been an area of priority and extensive research. Recent years have seen a considerable growth in experimenting with biologically inspired techniques. This is a consequence of the authors increased understanding of living systems and the application of that understanding to machines and software. The mounting complexity of telecommunications networks and the need for increasing levels of security have been the driving factors. The human body can act as a great role model for its … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…This paper lists the comparison results of route authentication technology, prefix hijacking detection technology, and the aPHD on various evaluation indexes, as shown in Table 1. With the advent of immune network theory, some scholars have applied immune network theory to network security, especially intrusion detection [27]. Different from traditional intrusion detection schemes, intrusion detection schemes based on immune network theory are fully capable of coping with the dynamics and complexity of network security.…”
Section: B Prefix Hijacking Detection Technologymentioning
confidence: 99%
“…This paper lists the comparison results of route authentication technology, prefix hijacking detection technology, and the aPHD on various evaluation indexes, as shown in Table 1. With the advent of immune network theory, some scholars have applied immune network theory to network security, especially intrusion detection [27]. Different from traditional intrusion detection schemes, intrusion detection schemes based on immune network theory are fully capable of coping with the dynamics and complexity of network security.…”
Section: B Prefix Hijacking Detection Technologymentioning
confidence: 99%
“…Machine learning methods have been used largely in the area of AIDS. Abundant methods and procedures such as genetic algorithms, decision trees, nearest neighbor methods, clustering, association rules, and neural networks have been applied for ascertaining the information from invaded datasets (Alaparthy and Morgera, 2019) .…”
Section: Introductionmentioning
confidence: 99%
“…In addition, there has been an alternate field of study [12], which take the human immune system (HIS) as an inspiration and derives an IDS for IoT networks. IDSs engineered [13,14] from HIS are commonly based on three different immune theories namely danger theory, negative selection, and clonal selection.…”
Section: Introductionmentioning
confidence: 99%