An artificial immune system architecture for computer security applications

IEEE Transactions on Evolutionary Computation - Tập 6 Số 3 - Trang 252-280 - 2002
Paul K. Harmer1, Paul D. Williams2, Gregg H. Gunsch3, Gary B. Lamont3
1Air Force Res. Lab, Wright-Patterson AFB, OH, USA
2[Air Intelligence Agency, Lackland Air Force Base, TX, USA]
3Air Force Institute of Technology OH USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

kumar, 1994, Introduction to Parallel Computing Design and Analysis of Algorithms

marmelstein, 1999, A white paper on modeling and analysis of computer immune systems using evolutionary algorithms

nadler, 1993, Pattern Recognition Engineering

tou, 1974, Pattern Recognition Principles

10.1109/ICSMC.2000.884976

10.1109/RISP.1994.296580

10.1145/283699.283742

10.1109/CSFW.1996.503687

kephart, 1994, a biologically inspired immune system for computers, Proc Fourth Int Workshop Synthesis and Simulation of Living Systems, 130

10.1007/978-3-642-76977-1

hofmeyr, 1999, An immunological model of distributed detection and its application to computer security

1999, A compendium of NP optimization problems

10.1038/scientificamerican0993-72

williams, 2001, Warthog Toward an artificial immune system for detecting &#x2018 low and slow&#x2019 information system attacks

harmer, 2000, A distributed agent architecture for a computer virus immune system

skardhamar, 1996, Virus Detection and Elimination

cohen, 1994, A Short Course on Computer Viruses

cult of the dead cow, 1999, Back Orifice 2000

ludwig, 1996, The Little Black Book of Computer Viruses

hoffman, 1990, Rogue Programs Viruses Worms and Trojan Horses

cardinale, 1999, A constructive induction approach to computer immunology

symantec, 2001, Symantec Security Response&#x2014 W32 Nimda A mm

10.1145/360825.360855

sycara, 1998, multiagent systems, AI Mag, 19, 79

kephart, 1997, blueprint for a computer immune system, Proceedings of the Virus Bulletin International Conference

10.1145/262793.262811

deloach, 1999, Using agentMOM

hofmeyr, 1999, immunity by design: an artificial immune system, Proceedings of the Genetic and Evolutionary Computation Conference, 1289

dasgupta, 1999, immunity-based intrusion detection systems: a general framework, 22nd Nat Information Systems Security Conf

10.1109/ICSMC.1998.726682

mori, 1996, multi-optimization by immune algorithm with diversity and learning, Proc Second Int Conf Multiagent Systems, 118

10.1109/ICEC.1998.699852

her majesty s office of information, 1996, Antibodies teach computers to learn

hunt, 0, The ISYS Project An Introduction

deloach, 1999, multiagent systems engineering: a methodology and language for designing agent systems, Proc Int Bi-Conf Workshop Agent-Oriented Information Systems, 45

leon, 2000, internet virus boom, Infoworld, 22, 36

symantec, 2001, Symantec Security Response&#x2014 Definitions Added

lamont, 1999, a distributed architecture for a self-adaptive computer virus immune system, New Ideas in Optimization, 167

10.1007/978-3-642-59901-9

williams, 2001, cdis: toward a computer immune system for detecting network intrusions, Proc Fourth Int Symp Recent Advances in Intrusion Detection, 117, 10.1007/3-540-45474-8_8

10.1109/ICSMC.1998.726686

benjamini, 1996, Immunology A Short Course

kephart, 1994, automatic extraction of computer virus signatures, Proceedings of the 4th Virus Bulletin International Conference, 179

jain, 1991, The Art of Computer Systems Performance Analysis

2000, Nessus Ver 1 0 5

tally s virii link reference, 1999, Tally s virus collection statistics

10.1007/BF02430363

10.1145/355826.355833

burridge, 1999, Java Shared Data Toolkit User Guide Version 1 5

cunningham, 1999, evaluating intrusion detection systems without attacking your friends: the 1998 darpa intrusion detection evaluation, Third Conf and Workshop on Intrusion Detection and Response

ducklin, 1999, Standard anti-virus test file