A method for anomaly detection is introduced in which" normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that the definition is stable …
A Gogna, A Tayal - Journal of Experimental & Theoretical Artificial …, 2013 - Taylor & Francis
The area of metaheuristics has grown immensely in the past two decades as a solution to real-world optimisation problems. They are able to perform well in situations where exact …
A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a good …
Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational …
D Wagner, P Soto - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
We examine several host-based anomaly detection systems and study their security against evasion attacks. First, we introduce the notion of a mimicry attack, which allows a …
A comprehensive introduction to new approaches in artificial intelligence and robotics that are inspired by self-organizing biological processes and structures. New approaches to …
SA Hofmeyr, S Forrest - Evolutionary computation, 2000 - ieeexplore.ieee.org
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance …
D Dasgupta, S Yu, F Nino - Applied Soft Computing, 2011 - Elsevier
The immune system is a remarkable information processing and self learning system that offers inspiration to build artificial immune system (AIS). The field of AIS has obtained a …
S Chebrolu, A Abraham, JP Thomas - Computers & security, 2005 - Elsevier
Current intrusion detection systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything) to …