Filters








24 Hits in 1.0 sec

Special issue on computational intelligence in cyber security [Preface]

Dipankar Dasgupta
2008 IEEE Computational Intelligence Magazine  
In order to protect large cyber infrastructure, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting a wide variety of threats  ...  typically include fuzzy logic, evolutionary computation, intelligent agents, neural networks, cellular automata, data mining, artificial immune systems and other similar biologically motivated computational models  ...  The first paper discussed mathematical models of immunocomputing to simulate a natural immune system to perform the actions of intrusion detection system.  ... 
doi:10.1109/mci.2008.919066 fatcat:4ak2sn5jzjge5or5tw6ta63rjy

Theory and applications of artificial immune systems

Xiao-Zhi Gao, Mo-Yuen Chow, David Pelta, Jon Timmis
2010 Neural computing & applications (Print)  
The field has developed significantly over the recent years, with the development of solutions to a wide variety of problems ranging from document analysis, optimization, dynamic error detection, intrusion  ...  detection, robot control and bioinformatics.  ...  The field has developed significantly over the recent years, with the development of solutions to a wide variety of problems ranging from document analysis, optimization, dynamic error detection, intrusion  ... 
doi:10.1007/s00521-010-0388-2 fatcat:qmbakpljvrc75l5p3ehw2557t4

Computational Intelligence in Cyber Security

Dipankar Dasgupta
2006 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety  
The use of these techniques allowed building efficient and robust decision support modules, providing cross-linking solutions to different cyber security applications.  ...  They typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models.  ...  There exist a number of agent-based intrusion detection systems but do not include the features that found in nature.  ... 
doi:10.1109/cihsps.2006.313289 fatcat:t5wir63zwbedrdz2o5cmlwy6ei

An immunity-based technique to characterize intrusions in computer networks

D. Dasgupta, F. Gonzalez
2002 IEEE Transactions on Evolutionary Computation  
The paper demonstrates the usefulness of such a technique to detect a wide variety of intrusive activities on networked computers.  ...  Experiments are performed using intrusion detection data sets and tested for validation. Some results are reported along with analysis and concluding remarks. , TN.  ...  There are multiple approaches to such anomaly detection [5] , [7] , [13] - [15] , [22] , [23] , [26] and most of them work by building a model or profile of the system that reflects its normal  ... 
doi:10.1109/tevc.2002.1011541 fatcat:skkebk4yp5a7philtjlsslug5q

Soft computing in intrusion detection: the state of the art

Chet Langin, Shahram Rahimi
2010 Journal of Ambient Intelligence and Humanized Computing  
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as consecutive, ensemble,  ...  Numerous comparisons of these methods are listed followed by a recommendation for future research. This paper can be used as a reference of strategies, and as a resource for planning future research.  ...  Model-based intrusion detection is defined in this paper as being a scenario model at a higher level of abstraction then audit records.  ... 
doi:10.1007/s12652-010-0012-4 fatcat:itlsb2cjm5aybgb6b2a4mmc4o4

An Ecological Approach to Anomaly Detection: The EIA Model [chapter]

Pedro Pinacho, Iván Pau, Max Chacón, Sergio Sánchez
2012 Lecture Notes in Computer Science  
If conditions are appropriate, changes in the population (modeled by the bioindicators) are representative of the alterations to the environment.  ...  This approach, based on an ecological view, improves functionally traditional approaches to the detection of anomalies.  ...  One of the more complex scenarios is Network Intrusion Detection Systems (NIDS).  ... 
doi:10.1007/978-3-642-33757-4_18 fatcat:souzurex35hmhnopskqr2za2hy

Advances in artificial immune systems

Dipankar Dasgupta
2006 IEEE Computational Intelligence Magazine  
The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions.  ...  The common trait of these problems is that the Intrusion Detection Systems can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1109/mci.2006.329705 fatcat:ut3cdxzvuzcizfsy2ei6pecdqe

Artificial Immune Systems [chapter]

2013 Encyclopedia of Systems Biology  
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions.  ...  that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1007/978-1-4419-9863-7_100063 fatcat:uzoidos2yjfmtjqtjnr7fexpku

Artificial Immune Systems [chapter]

Uwe Aickelin, Dipankar Dasgupta, Feng Gu
2013 Search Methodologies  
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions.  ...  that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1007/978-1-4614-6940-7_7 fatcat:4ty3a6rjdrbkdgo6rgcql3ahdq

Advances in artificial immune systems

Dipankar Dasgupta
2006 IEEE Computational Intelligence Magazine  
The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions.  ...  The common trait of these problems is that the Intrusion Detection Systems can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1109/ci-m.2006.248056 fatcat:g5czgsmucregpjqke3oszr3v4y

Artificial Immune Systems [article]

Uwe Aickelin, Dipankar Dasgupta
2009 arXiv   pre-print
The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response  ...  There are two major branches of the immune system.  ...  The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions.  ... 
arXiv:0910.4899v1 fatcat:fczwrayqerbzfcg2wqzg25lhge

Artificial Immune Systems [chapter]

2010 Decision Engineering  
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions.  ...  that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1007/978-1-84996-129-5_9 fatcat:o52jzt3svfdyrnhezu65tiwdau

Artificial Immune Systems [chapter]

Dipankar Dasgupta
2013 Encyclopedia of Sciences and Religions  
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions.  ...  that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1007/978-1-4020-8265-8_1208 fatcat:ceyqhosi2bdljadae6oykkav2y

Artificial Immune Systems [chapter]

Julie Greensmith, Amanda Whitbrook, Uwe Aickelin
2010 International Series in Operations Research and Management Science  
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions.  ...  that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported.  ... 
doi:10.1007/978-1-4419-1665-5_14 fatcat:jkuvhn3eznh6neyl7naz4fp464

Artificial Immune Systems (INTROS 2) [article]

Uwe Aickelin, Dipankar Dasgupta, Feng Gu
2013 arXiv   pre-print
The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response  ...  There are two major branches of the immune system.  ...  The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions.  ... 
arXiv:1308.5138v1 fatcat:d7eo2qss5nbyvfocdfc4467fba
« Previous Showing results 1 — 15 out of 24 results