LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Twycross, Jamie; Aickelin, Uwe (2010)
Languages: English
Types: Unknown
Subjects: Computer Science - Artificial Intelligence, Computer Science - Neural and Evolutionary Computing
In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial\ud immune systems (AISs) and presented an outline for a conceptualframework for such systems. A number of key general properties observed in the biological innate and adaptive immune systems were highlighted, and how such properties might be instantiated in artificial systems was discussed in detail. The next logical step is to take these ideas and build a software system with which AISs with these properties can be implemented and experimentally evaluated. This paper reports on the results of that step - the libtissue system.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] P. Bentley, J. Greensmith, and S. Ujjin, “Two ways to grow tissue for artificial immune systems,” in 4th Int. Conference on Artificial Immune Systems. Banff, Canada: LNCS 3627, 2005, pp. 139-152.
    • [2] J. Twycross and U. Aickelin, “Towards a conceptual framework for innate immunity,” in 4th Int. Conference on Artificial Immune Systems. Banff, Canada: LNCS 3627, 2005, pp. 112-125.
    • [3] R. N. Germain, “An innately interesting decade of research in immunology,” Nature Medicine, vol. 10, no. 12, pp. 1307-1320, 2004.
    • [4] N. Provos, “Improving host security with system call policies,” in Proc. of the 12th USENIX Security Symposium, Washington, D.C., August 2003, pp. 257-272.
    • [5] “Lincoln Labs DARPA Intrusion Detection Evaluation,” http://www.ll. mit.edu/IST/ideval/.
    • [6] “strace homepage,” http://www.liacs.nl/∼wichert/strace/.
    • [7] C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, “On the detection of anomalous system call arguments,” in Proc. of the 8th European Symposium on Research in Computer Security (ESORICS '03), Gjovik, Norway, October 2003, pp. 326-343.
    • [8] D. Gao, M. K. Reiter, and D. Song, “On gray-box program tracking for anomaly detection,” in Proc. of the 13th USENIX Security Symposium, San Diego, CA, August 2004, pp. 103-118.
    • [9] J. Greensmith, J. Twycross, and U. Aickelin, “Dendritic cells for anomaly detection,” Submitted to CEC06, 2006.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article