[PDF][PDF] An application of machine learning to anomaly detection

T Lane, CE Brodley - Proceedings of the 20th national information …, 1997 - cerias.purdue.edu
The anomaly detection problem has been widely studied in the computer security literature.
In this paper we present a machine learning approach to anomaly detection. Our system …

Application areas of AIS: The past, the present and the future

E Hart, J Timmis - Applied soft computing, 2008 - Elsevier
After a decade of research into the area of artificial immune systems, it is worthwhile to take
a step back and reflect on the contributions that the paradigm has brought to the application …

[PDF][PDF] Immunity by design: An artificial immune system

SA Hofmeyr, S Forrest - Proceedings of the 1st Annual Conference on …, 1999 - Citeseer
Immunity by Design: An Artificial Immune System Page 1 Immunity by Design: An Artificial
Immune System Steven A. Hofmeyr and Stephanie Forrest Dept. of Computer Science University …

[PDF][PDF] Principles of a computer immune system

A Somayaji, S Hofmeyr, S Forrest - … of the 1997 workshop on New …, 1998 - dl.acm.org
Natural immune systems provide a rich source ofinspiration for computer security in the age
of the Internet. Immune systems have many features that are desirable for the im-perfect …

Detecting anomalous and unknown intrusions against programs

AK Ghosh, J Wanken, F Charron - Proceedings 14th annual …, 1998 - ieeexplore.ieee.org
The ubiquity of the Internet connection to desktops has been both a boon to business as well
as a cause for concern for the security of digital assets that may be unknowingly exposed …

A modified epidemiological model for computer viruses

JRC Piqueira, VO Araujo - Applied Mathematics and Computation, 2009 - Elsevier
Since the computer viruses pose a serious problem to individual and corporative computer
systems, a lot of effort has been dedicated to study how to avoid their deleterious actions …

Robustness of the Markov-chain model for cyber-attack detection

N Ye, Y Zhang, CM Borror - IEEE transactions on reliability, 2004 - ieeexplore.ieee.org
Cyber-attack detection is used to identify cyber-attacks while they are acting on a computer
and network system to compromise the security (eg, availability, integrity, and confidentiality) …

An immunological model of distributed detection and its application to computer security

SA Hofmeyr - 1999 - search.proquest.com
This dissertation explores an immunological model of distributed detection, called negative
detection, and studies its performance in the domain of intrusion detection on computer …

Detecting anomalous network traffic with self-organizing maps

M Ramadas, S Ostermann, B Tjaden - International Workshop on Recent …, 2003 - Springer
Abstract Integrated Network-Based Ohio University Network Detective Service (INBOUNDS)
is a network based intrusion detection system being developed at Ohio University. The …

Lightweight defect localization for Java

V Dallmeier, C Lindig, A Zeller - … Conference, Glasgow, UK, July 25-29 …, 2005 - Springer
A common method to localize defects is to compare the coverage of passing and failing
program runs: A method executed only in failing runs, for instance, is likely to point to the …