A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Danger Theory: The Link between AIS and IDS?
[chapter]
2003
Lecture Notes in Computer Science
This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly ...
The central challenge with computer security is determining the difference between normal and potentially harmful activity. ...
Existing IDS employ various types of sensors that monitor Danger Theory: The Link between AIS and IDS? 7 low-level system events. ...
doi:10.1007/978-3-540-45192-1_15
fatcat:t4q4aryvzve5xof3taukt26nme
Danger Theory: The Link between AIS and IDS?
2004
Social Science Research Network
This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly ...
The central challenge with computer security is determining the difference between normal and potentially harmful activity. ...
Existing IDS employ various types of sensors that monitor Danger Theory: The Link between AIS and IDS? 7 low-level system events. ...
doi:10.2139/ssrn.2832042
fatcat:63xsy4r5dbhrvf3reaf6n4xldi
A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents
[article]
2014
arXiv
pre-print
Danger theory solves many problems that could only be partially explained by the traditional model. ...
In our protocol, we define several immune signals and model cell signaling via message passing between agents that emulate cells. ...
ACKNOWLEDGMENT The authors would like to thank Mohammad Ebadzadeh and Hossein Pedram from Amirkabir University of Technology, Iran for their valuable contributions to the discussions and for their supportive ...
arXiv:1401.0102v3
fatcat:a2mfdcxvgrhhbivzunxsztfxem
Danger theory and collaborative filtering in MANETs
2008
Journal in Computer Virology
Our prior work in the field led to the design of BITSI -the Biologically-Inspired Tactical Security Infrastructure. BITSI implements a simple artificial immune system based upon Danger Theory. ...
Finally, we explore the implications of the results for further work in the field, and describe our plans for new research. ...
This early work has sparked further exploration of such metaphors; for example, Sarafijanovic & Le Boudec [13] designed an AIS tightly linked to the biological immune system, using Danger Theory. ...
doi:10.1007/s11416-008-0098-9
fatcat:f26z5mxprrfy7it7h7zp53wzqu
Biological inspired anomaly detection based on danger theory
2013
The 5th Conference on Information and Knowledge Technology
So in this paper, we propose a novel method in danger theory field for anomaly detection and decrease the amount of system false alarms by using danger signals which are produced through a KNN classifier ...
Since traditional Anomaly Detection Methods produce a large number of false alarms, AIS methods based on Danger Theory are suitable options for intrusion detection that can handle the above problem. ...
The DCA relies on the signal processing aspect by using multiple input and output signals, while the TLR emphasizes the interaction between DCs and T cells, only uses danger signal [10] . ...
doi:10.1109/ikt.2013.6620047
fatcat:t5z7l5wthjedlbi55n7giia7vu
Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
2015
PLoS ONE
Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks ...
Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. ...
Cooperates with the other authors to succeed the paper: SA. ...
doi:10.1371/journal.pone.0120715
pmid:25946001
pmcid:PMC4422671
fatcat:vlw6ivtfkffadlmfm7ecdfjdje
A Little Theory is a Dangerous Thing: The Myth of Adjudicative Retroactivity
1999
Social Science Research Network
Similarly, distinguishing between direct and collateral review requires more than an appeal to the value of finality and the danger of disruption. ...
They can be loosely linked, respectively, to natural law and positivist theories. 226 If the content of "law" is extended to include broad moral and political principles, then it is obviously easier ...
Since no clear line exists between incremental changes in law and rules so new that their enforcement would serve no deterrent purpose, the result of a purposebased inquiry should seldom be foreordained ...
doi:10.2139/ssrn.160408
fatcat:2si3hereuba53kk5siyi3y6a2q
Sensing Danger: Innate Immunology for Intrusion Detection
2007
Social Science Research Network
However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. ...
Acknowledgments This project is supported by the EPSRC, grant number GR/S47809/01, UCL, UWE and HPLabs. ...
doi:10.2139/ssrn.2824153
fatcat:tdwsp3dbebfybbuqzoyblqzvvy
Sensing danger: Innate immunology for intrusion detection
2007
Information Security Technical Report
However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. ...
Acknowledgments This project is supported by the EPSRC, grant number GR/S47809/01, UCL, UWE and HPLabs. ...
doi:10.1016/j.istr.2007.10.003
fatcat:253ckefdcvaqffkmmuou7l23ji
Problematic Node Identification with Negative Selection, Danger Theory and Clonal Selection using Source Based Immunization with Tag Scaling in Mobile Ad-Hoc Network
2019
International Journal of Future Generation Communication and Networking
Hence, we propose an approach for problematic node identification with negative selection, danger theory and clonal selection using source-based immunization. ...
The proposed work has been simulated and presented with the results being compared with the existing approaches. ...
The Danger Theory has its very own draw backs and [7] proposed uses of the Danger Theory that feature: -To show danger signal proximity of an Antigen Presenting Cell is essential. ...
doi:10.33832/ijfgcn.2019.12.4.01
fatcat:hrje6ng2kzhephexbzspwmzrae
Detecting Danger: The Dendritic Cell Algorithm
[article]
2010
arXiv
pre-print
In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. ...
Each DC has the ability to combine multiple data streams and can add context to data suspected as anomalous. In this chapter the abstraction process and details of the resultant algorithm are given. ...
Therefore a population of antigen is used, linked to the activity of the program, and all bearing the same ID number. ...
arXiv:1006.5008v1
fatcat:r5n62r5qtfb3raws7xookhsbty
Detecting Danger: The Dendritic Cell Algorithm
[chapter]
2008
Robust Intelligent Systems
In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. ...
Each DC has the ability to combine multiple data streams and can add context to data suspected as anomalous. In this chapter the abstraction process and details of the resultant algorithm are given. ...
Therefore a population of antigen is used, linked to the activity of the program, and all bearing the same ID number. ...
doi:10.1007/978-1-84800-261-6_5
fatcat:7vbj5u72hzd2xhryhfbihlrume
Detecting Danger: The Dendritic Cell Algorithm
2008
Social Science Research Network
In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. ...
Each DC has the ability to combine multiple data streams and can add context to data suspected as anomalous. In this chapter the abstraction process and details of the resultant algorithm are given. ...
Therefore a population of antigen is used, linked to the activity of the program, and all bearing the same ID number. ...
doi:10.2139/ssrn.2827962
fatcat:zxsldfsz3fgdhjedkueahwaeqy
Dangerous Bodies: Freak Shows, Expression, and Exploitation
2007
UCLA Entertainment Law Review
In Part Three, I introduce research and theories of non-legal scholars and comment on aspects of those theories that will be particularly relevant to the discussion of freak shows in legal discourse. ...
When the court discusses the danger of exploitation, it is the general public that it finds in danger of being exploited by the spectacle of unusual bodies. ...
doi:10.5070/lr8142027098
fatcat:vloupdl3tbgtjniismpt4bva3q
Dangerous Bodies: Freak Shows, Expression, and Exploitation
2007
Social Science Research Network
In Part Three, I introduce research and theories of non-legal scholars and comment on aspects of those theories that will be particularly relevant to the discussion of freak shows in legal discourse. ...
When the court discusses the danger of exploitation, it is the general public that it finds in danger of being exploited by the spectacle of unusual bodies. ...
doi:10.2139/ssrn.1604168
fatcat:zy4hqsyfgfcmvk46lipd3ayvta
« Previous
Showing results 1 — 15 out of 12,692 results