LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Watkins, A. (2000)
Languages: English
Types: Unknown
Subjects: QA76
This paper presents an examination of intrusion detection schemes. It discusses\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\ud effective, approach to intrusion detection as modeled on the human immune system. The\ud discussion looks at some of the implications raised by intrusion detection research for\ud information security in general.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Crosbie, Mark and Gene Spafford. 1995. Active Defense of a Computer System using Autonomous Agents. Purdue University Department of Computer Science. Technical Report 95-008.
    • [2] Forrest, Stephanie, Steven A. Hofmeyr, and Anil Somayaji. 1997. Computer Immunology. Communications of the ACM 40(10) (October, 1997): 88-96.
    • [3] Forrest, Stephanie, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. 1996. A Sense of Self for Unix Processes. In Proceedings 1996 IEEE Symposium on Security and Privacy in Oakland, California, May, 1996 by IEEE Computer Society, 120-128. Los Alamitos, CA: IEEE Computer Society.
    • [4] Luo, Jianxiong. 1999. Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection. M.S. Thesis, Mississippi State University.
    • [5] Somayaji, Anil, Steven Hofmeyr, and Stephanie Forrest. 1997. Principles of a Computer Immune System. From New Security Paradigms Workshop (Presented September, 1997). Downloaded from http://www.cs.unm.edu/~immsec/papers.htm on 15 July 1999.
    • [6] Stillerman, Matthew, Carla Morceau, and Maureen Stillman. 1999. Intrusion Detection for Distributed Applications. Communications of the ACM 42(7) (July, 1999): 62-69.
    • [7] Sunderam, Aurobindo. 1996. An Introduction to Intrusion Detection. Downloaded from http://www.cs.purdure.edu/coast/archive/data/categ24.html on 15 June 1999.
    • [8] Vaughn, Rayford B. 1996. A Practical Approach to Sufficient Infosec. National Information System Security Conference in Arlington, Virginia, October 1998, sponsored by National Institute of Standards and Technology and National Computer Security Center. Volume 1: 1-11.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article