Filters








12,692 Hits in 8.9 sec

Danger Theory: The Link between AIS and IDS? [chapter]

U. Aickelin, P. Bentley, S. Cayzer, J. Kim, J. McLeod
2003 Lecture Notes in Computer Science  
This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly  ...  The central challenge with computer security is determining the difference between normal and potentially harmful activity.  ...  Existing IDS employ various types of sensors that monitor Danger Theory: The Link between AIS and IDS? 7 low-level system events.  ... 
doi:10.1007/978-3-540-45192-1_15 fatcat:t4q4aryvzve5xof3taukt26nme

Danger Theory: The Link between AIS and IDS?

Uwe Aickelin, Peter Bentley, Steve Cayzer, Jungwon Kim
2004 Social Science Research Network  
This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly  ...  The central challenge with computer security is determining the difference between normal and potentially harmful activity.  ...  Existing IDS employ various types of sensors that monitor Danger Theory: The Link between AIS and IDS? 7 low-level system events.  ... 
doi:10.2139/ssrn.2832042 fatcat:63xsy4r5dbhrvf3reaf6n4xldi

A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents [article]

Mahdi Zamani and Mahnush Movahedi and Mohammad Ebadzadeh and Hossein Pedram
2014 arXiv   pre-print
Danger theory solves many problems that could only be partially explained by the traditional model.  ...  In our protocol, we define several immune signals and model cell signaling via message passing between agents that emulate cells.  ...  ACKNOWLEDGMENT The authors would like to thank Mohammad Ebadzadeh and Hossein Pedram from Amirkabir University of Technology, Iran for their valuable contributions to the discussions and for their supportive  ... 
arXiv:1401.0102v3 fatcat:a2mfdcxvgrhhbivzunxsztfxem

Danger theory and collaborative filtering in MANETs

Katherine Hoffman, Attila Ondi, Richard Ford, Marco Carvalho, Derek Brown, William H. Allen, Gerald A. Marin
2008 Journal in Computer Virology  
Our prior work in the field led to the design of BITSI -the Biologically-Inspired Tactical Security Infrastructure. BITSI implements a simple artificial immune system based upon Danger Theory.  ...  Finally, we explore the implications of the results for further work in the field, and describe our plans for new research.  ...  This early work has sparked further exploration of such metaphors; for example, Sarafijanovic & Le Boudec [13] designed an AIS tightly linked to the biological immune system, using Danger Theory.  ... 
doi:10.1007/s11416-008-0098-9 fatcat:f26z5mxprrfy7it7h7zp53wzqu

Biological inspired anomaly detection based on danger theory

Soudeh Behrozinia, Reza Azmi, M Reza Keyvanpour, Boshra Pishgoo
2013 The 5th Conference on Information and Knowledge Technology  
So in this paper, we propose a novel method in danger theory field for anomaly detection and decrease the amount of system false alarms by using danger signals which are produced through a KNN classifier  ...  Since traditional Anomaly Detection Methods produce a large number of false alarms, AIS methods based on Danger Theory are suitable options for intrusion detection that can handle the above problem.  ...  The DCA relies on the signal processing aspect by using multiple input and output signals, while the TLR emphasizes the interaction between DCs and T cells, only uses danger signal [10] .  ... 
doi:10.1109/ikt.2013.6620047 fatcat:t5z7l5wthjedlbi55n7giia7vu

Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

Maha Abdelhaq, Raed Alsaqour, Shawkat Abdelhaq, Peter Csermely
2015 PLoS ONE  
Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks  ...  Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network.  ...  Cooperates with the other authors to succeed the paper: SA.  ... 
doi:10.1371/journal.pone.0120715 pmid:25946001 pmcid:PMC4422671 fatcat:vlw6ivtfkffadlmfm7ecdfjdje

A Little Theory is a Dangerous Thing: The Myth of Adjudicative Retroactivity

Kermit Roosevelt
1999 Social Science Research Network  
Similarly, distinguishing between direct and collateral review requires more than an appeal to the value of finality and the danger of disruption.  ...  They can be loosely linked, respectively, to natural law and positivist theories. 226 If the content of "law" is extended to include broad moral and political principles, then it is obviously easier  ...  Since no clear line exists between incremental changes in law and rules so new that their enforcement would serve no deterrent purpose, the result of a purposebased inquiry should seldom be foreordained  ... 
doi:10.2139/ssrn.160408 fatcat:2si3hereuba53kk5siyi3y6a2q

Sensing Danger: Innate Immunology for Intrusion Detection

Uwe Aickelin
2007 Social Science Research Network  
However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved.  ...  The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular.  ...  Acknowledgments This project is supported by the EPSRC, grant number GR/S47809/01, UCL, UWE and HPLabs.  ... 
doi:10.2139/ssrn.2824153 fatcat:tdwsp3dbebfybbuqzoyblqzvvy

Sensing danger: Innate immunology for intrusion detection

Uwe Aickelin, Julie Greensmith
2007 Information Security Technical Report  
However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved.  ...  The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular.  ...  Acknowledgments This project is supported by the EPSRC, grant number GR/S47809/01, UCL, UWE and HPLabs.  ... 
doi:10.1016/j.istr.2007.10.003 fatcat:253ckefdcvaqffkmmuou7l23ji

Problematic Node Identification with Negative Selection, Danger Theory and Clonal Selection using Source Based Immunization with Tag Scaling in Mobile Ad-Hoc Network

Nitin Tyagi, Manas Kumar Mishra
2019 International Journal of Future Generation Communication and Networking  
Hence, we propose an approach for problematic node identification with negative selection, danger theory and clonal selection using source-based immunization.  ...  The proposed work has been simulated and presented with the results being compared with the existing approaches.  ...  The Danger Theory has its very own draw backs and [7] proposed uses of the Danger Theory that feature: -To show danger signal proximity of an Antigen Presenting Cell is essential.  ... 
doi:10.33832/ijfgcn.2019.12.4.01 fatcat:hrje6ng2kzhephexbzspwmzrae

Detecting Danger: The Dendritic Cell Algorithm [article]

Julie Greensmith, Uwe Aickelin, Steve Cayzer
2010 arXiv   pre-print
In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA.  ...  Each DC has the ability to combine multiple data streams and can add context to data suspected as anomalous. In this chapter the abstraction process and details of the resultant algorithm are given.  ...  Therefore a population of antigen is used, linked to the activity of the program, and all bearing the same ID number.  ... 
arXiv:1006.5008v1 fatcat:r5n62r5qtfb3raws7xookhsbty

Detecting Danger: The Dendritic Cell Algorithm [chapter]

Julie Greensmith, Uwe Aickelin, Steve Cayzer
2008 Robust Intelligent Systems  
In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA.  ...  Each DC has the ability to combine multiple data streams and can add context to data suspected as anomalous. In this chapter the abstraction process and details of the resultant algorithm are given.  ...  Therefore a population of antigen is used, linked to the activity of the program, and all bearing the same ID number.  ... 
doi:10.1007/978-1-84800-261-6_5 fatcat:7vbj5u72hzd2xhryhfbihlrume

Detecting Danger: The Dendritic Cell Algorithm

Julie Greensmith, Uwe Aickelin, Steve Cayzer
2008 Social Science Research Network  
In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA.  ...  Each DC has the ability to combine multiple data streams and can add context to data suspected as anomalous. In this chapter the abstraction process and details of the resultant algorithm are given.  ...  Therefore a population of antigen is used, linked to the activity of the program, and all bearing the same ID number.  ... 
doi:10.2139/ssrn.2827962 fatcat:zxsldfsz3fgdhjedkueahwaeqy

Dangerous Bodies: Freak Shows, Expression, and Exploitation

Brigham A. Fordham
2007 UCLA Entertainment Law Review  
In Part Three, I introduce research and theories of non-legal scholars and comment on aspects of those theories that will be particularly relevant to the discussion of freak shows in legal discourse.  ...  When the court discusses the danger of exploitation, it is the general public that it finds in danger of being exploited by the spectacle of unusual bodies.  ... 
doi:10.5070/lr8142027098 fatcat:vloupdl3tbgtjniismpt4bva3q

Dangerous Bodies: Freak Shows, Expression, and Exploitation

Brigham A. Fordham
2007 Social Science Research Network  
In Part Three, I introduce research and theories of non-legal scholars and comment on aspects of those theories that will be particularly relevant to the discussion of freak shows in legal discourse.  ...  When the court discusses the danger of exploitation, it is the general public that it finds in danger of being exploited by the spectacle of unusual bodies.  ... 
doi:10.2139/ssrn.1604168 fatcat:zy4hqsyfgfcmvk46lipd3ayvta
« Previous Showing results 1 — 15 out of 12,692 results