Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'

Greensmith, Julie and Aickelin, Uwe and Twycross, Jamie (2004) Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'. In: 6th International Conference in Adaptive Computing in Design and Manufacture, 2004, Bristol, UK.

WarningThere is a more recent version of this item available.

[img]
Preview
PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
20Kb

Abstract

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

Item Type:Conference or Workshop Item (Paper)
Schools/Departments:Faculty of Science > School of Computer Science and Information Technology
ID Code:270
Deposited By:Aickelin, Professor Uwe
Deposited On:07 Nov 2005
Last Modified:12 Oct 2007 15:00

Available Versions of this Item

Repository Staff Only: item control page