Artificial Immune Systems for IT-Security

被引:1
作者
Stibor, Thomas [1 ]
Eckert, Claudia [1 ]
Timmis, Jonathan [2 ,3 ]
机构
[1] Tech Univ Darmstadt, Fachbereich Informat, Hochschulstr 10, D-64289 Darmstadt, Germany
[2] Univ York, Dept Comp Sci, York YO10 5DD, N Yorkshire, England
[3] Univ York, Dept Elect, York YO10 5DD, N Yorkshire, England
来源
IT-INFORMATION TECHNOLOGY | 2006年 / 48卷 / 03期
关键词
H.1 [Models And Principles; E.2 [Data Storage Representations; Artificial Immune Systems; Computer Security; Intrusion Detection; Database Security;
D O I
10.1524/itit.2006.48.3.168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The immune system is an impressive information processing system with many appealing properties for solving problems. Artificial immune systems are a paradigm inspired by the immune system and are used for solving computational and information processing problems. In this paper, we outline two different immune-inspired approaches typically used for IT-security problems. Specifically, we present one of the first proposed immune inspired approaches for network intrusion detection, this is then complimented with an overview of recent investigations on the latest immunological theories and how they may be exploited in IT-security. We then present an artificial immune system concept for database security which encompasses issues such as confidentiality of database information and prevention of privacy-preserving data mining.
引用
收藏
页码:168 / 173
页数:6
相关论文
共 17 条
[1]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[2]  
Aickelin U, 2002, P 1 INT C ART IMM SY, P141, DOI DOI 10.2139/SSRN.2832054
[3]  
de Castro L., 2002, ARTIFICIAL IMMUNE SY
[4]  
Esponda F, 2004, LECT NOTES COMPUT SC, V3239, P175
[5]  
Esponda F., 2004, A667894 DTIC
[6]  
FORREST S, 1994, P IEEE S RES SEC PRI
[7]  
Freitas AA, 2003, LECT NOTES COMPUT SC, V2787, P229
[8]  
Greensmith J, 2005, LECT NOTES COMPUT SC, V3627, P153
[9]  
Hart E., 2005, LECT NOTES COMPUTER, V3627, P316
[10]   Architecture for an Artificial Immune System [J].
Hofmeyr, Steven A. ;
Forrest, Stephanie .
EVOLUTIONARY COMPUTATION, 2000, 8 (04) :443-473