An Artificial Immune System Approach to Preserving Security in Computer Networks

作者: Martin Thorsen Ranang

DOI:

关键词:

摘要: It is believed that many of the mechanisms present in biological immune system are well suited for adoption to field computer intrusion detection, form artificial ...

参考文章(29)
Ron Hightower, Stephanie Forrest, Alan S. Perelson, The Baldwin effect in the immune system: learning by somatic hypermutation Adaptive individuals in evolving populations. pp. 159- 167 ,(1996)
J. Reynolds, Assigned Numbers: RFC 1700 is Replaced by an On-line Database RFC. ,vol. 3232, pp. 1- 3 ,(2002)
Dipankar Dasgupta, Yuehua Cao, Congjun Yang, An Immunogenetic Approach to Spectra Recognition genetic and evolutionary computation conference. pp. 149- 155 ,(1999)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
David B. Fogel, Zbigniew Michalewicz, How to Solve It: Modern Heuristics ,(2004)
Peter J. Bentley, Jungwon Kim, An evaluation of negative selection in an artificial immune system for network intrusion detection genetic and evolutionary computation conference. pp. 1330- 1337 ,(2001)
J. Postel, Transmission Control Protocol Internet Request for Comment (RFC793). ,vol. 793, pp. 1- 91 ,(1981)
Linda Pesante, CERT® Coordination Center Encyclopedia of Software Engineering. ,(2002) , 10.1002/0471028959.SOF035
J. Balthrop, S. Forrest, M.R. Glickman, Revisiting LISYS: parameters and normal behavior congress on evolutionary computation. ,vol. 2, pp. 1045- 1050 ,(2002) , 10.1109/CEC.2002.1004387
J. K. Percus, O. E. Percus, A. S. Perelson, Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination Proceedings of the National Academy of Sciences of the United States of America. ,vol. 90, pp. 1691- 1695 ,(1993) , 10.1073/PNAS.90.5.1691