Applications of artificial immune systems to computer security: A survey

被引:33
作者
Fernandes, Diogo A. B. [1 ]
Freire, Mario M. [1 ]
Fazendeiro, Paulo A. P. [1 ]
Inacio, Pedro R. M. [1 ]
机构
[1] Univ Beira Interior, Dept Comp Sci, Inst Telecomunicacoes, Rua Marques dAvila & Bolama, P-6201001 Covilha, Portugal
关键词
Artificial immune systems; Nature-inspired computing; Security; Survey; SELF-NONSELF DISCRIMINATION; NETWORK INTRUSION DETECTION; AD-HOC NETWORKS; ANOMALY DETECTION; CLONAL SELECTION; MISBEHAVIOR DETECTION; ANTIBODY REPERTOIRE; DENDRITIC CELLS; SPAM; ALGORITHMS;
D O I
10.1016/j.jisa.2017.06.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the last two decades, artificial immune systems have been studied in various fields of knowledge. They were shown to be particularly effective tools at detecting anomalous behavior in the security domain of computer systems. This article introduces the principles of artificial immune systems and surveys several works applying such systems to computer security problems. The works herein discussed are summarized and open issues are pointed out afterwards, elaborating on a novel applicability of these systems to cloud computing environments. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:138 / 159
页数:22
相关论文
共 149 条
[1]   Genetic optimized artificial immune system in spam detection: a review and a model [J].
Abu Zitar, Raed ;
Hamdan, Adel .
ARTIFICIAL INTELLIGENCE REVIEW, 2013, 40 (03) :305-377
[2]   Virus detection using clonal selection algorithm with Genetic Algorithm (VDC algorithm) [J].
Afaneh, Suha ;
Abu Zitar, Raed ;
Al-Hamami, Alaa .
APPLIED SOFT COMPUTING, 2013, 13 (01) :239-246
[3]  
Aggarwal CC, 2001, LECT NOTES COMPUT SC, V1973, P420
[4]  
Aickelin U, 2004, LECT NOTES COMPUT SC, V3239, P316
[5]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[6]  
Ali K., 2009, P IEEE GLOB TEL C GL, P1
[7]  
[Anonymous], 2017, INAC 2017 INT NUCL A
[8]  
[Anonymous], 2003, ART DECEPTION CONTRO
[9]  
[Anonymous], 1999, THESIS
[10]  
[Anonymous], 2015, TECHN REP