Intrusion detection system based on the artificial immune system
نویسندگان
چکیده
منابع مشابه
Artificial Immune System based General Purpose Intrusion Detection System
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...
متن کاملArtificial Immune System for Intrusion Detection
One of the central challenges with computer security is determining the difference between normal and potentially harmful activity. For decades, developers have protected their systems using classical methods. However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensives tools. Promising solutions are emerging with bio...
متن کاملIntrusion Detection via Artificial Immune System: a Performance-based Approach
In this paper, we discuss the design and engineering of a biologicallyinspired, host-based intrusion detection system to protect computer networks. To this end, we have implemented an Artificial Immune System (AIS) that mimics the behavior of the biological adaptive immune system. The proposed AIS, consists of a number of running artificial white blood cells, which search, recognize, store and ...
متن کاملA Survey of Artificial Immune System Based Intrusion Detection
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods...
متن کاملImmune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still need to be designed for IT systems. The human immune system (HIS) can detect and defend against yet unseen intruders, is distributed, adaptive and multilayered to name only a few of its features. Our immune system incorpo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of Perm National Research Polytechnic University. Electrotechnics, Informational Technologies, Control Systems
سال: 2019
ISSN: 2224-9397
DOI: 10.15593/2224-9397/2019.1.13