Immune system approaches to intrusion detection - A review

被引:134
作者
Kim J. [1 ]
Bentley P.J. [1 ]
Aickelin U. [2 ]
Greensmith J. [2 ]
Tedesco G. [3 ]
Twycross J. [2 ]
机构
[1] Department of Computer Science, University College London, London
[2] School of Computer Science, University of Nottingham, Nottingham
[3] Firestorm Development Team, Bradford
基金
英国工程与自然科学研究理事会;
关键词
Artificial immune systems; Intrusion detection systems; Literature review;
D O I
10.1007/s11047-006-9026-4
中图分类号
学科分类号
摘要
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. First, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Second, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research. © Springer Science+Business Media, Inc. 2007.
引用
收藏
页码:413 / 466
页数:53
相关论文
共 115 条
[1]  
Aickelin U., Greensmith J., Twycross J., Immune system approaches to intrusion detection - A review, Proceedings ICARIS-2004, 3rd International Conference on Artificial Immune Systems, pp. 316-329, (2004)
[2]  
Aickelin U., Bentley P., Cayzer S., Kim J., McLeod J., Danger theory: The link between ais and ids, Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03), pp. 147-155, (2003)
[3]  
Aickelin U., Cayzer S., The danger theory and its application to ais, Proceeding of the First International Conference on Artificial Immune System (ICARIS-2002), pp. 141-148, (2002)
[4]  
Axelsson S., Intrusion Detection Systems: A Survey and Taxonomy, (1999)
[5]  
Ayara M., Timmis J., de Lemos R., de Castro L.N., Duncan R., Negative selection: How to generate detectors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02), pp. 89-98, (2002)
[6]  
Balthrop J., Personal Communication, (2004)
[7]  
Balthrop J., Esponda F., Forrest S., Glickman M., Coverage and generalization in an artificial immune system, Proceedings of GECCO, pp. 3-10, (2002)
[8]  
Balthrop J., Forrest S., Glickman M., Revisiting lisys: Parameters and normal behaviour, Proceedings of the Congress on Evolutionary Computation, pp. 1045-1050, (2002)
[9]  
Begnum K., Burgess M., A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine), Integrated Network Management, pp. 31-42, (2003)
[10]  
Bentley P., Greensmith J., Ujin S., Two ways to grow tissue for artificial immune systems, Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), 3627, pp. 139-152, (2005)