Applications of artificial immune systems to computer security: A survey

DAB Fernandes, MM Freire, PAP Fazendeiro… - Journal of Information …, 2017 - Elsevier
For the last two decades, artificial immune systems have been studied in various fields of
knowledge. They were shown to be particularly effective tools at detecting anomalous …

Negative selection in anomaly detection—A survey

P Saurabh, B Verma - Computer Science Review, 2023 - Elsevier
The remarkable ability to separate and identify self and non-self in a given problem space,
makes negative selection a fascinating concept of artificial immune system. Therefore …

Method of and system for detecting an anomalous operation of a computer system

JC Munson, SG Elbaum - US Patent 6,963,983, 2005 - Google Patents
(57) ABSTRACT A real-time approach for detecting aberrant modes of System behavior
induced by abnormal and unauthorized System activities that are indicative of an intrusive …

[PDF][PDF] Architecture for an artificial immune system

SA Hofmeyr, S Forrest - Evolutionary Computation, 1999 - cs.columbia.edu
An artificial immune system (ARTIS) is described which incorporates many properties of
natural immune systems, including diversity, distributed computation, error tolerance …

A comparative study on outlier detection techniques for noisy production data from unconventional shale reservoirs

HS Jha, A Khanal, HMD Seikh, WJ Lee - Journal of Natural Gas Science …, 2022 - Elsevier
Decline curve analyses (DCA) and rate transient analyses (RTA) are widely used to
characterize the fluid flow through porous media and forecast future production. Oil and gas …

Revisiting lisys: Parameters and normal behavior

J Balthrop, S Forrest… - Proceedings of the 2002 …, 2002 - ieeexplore.ieee.org
This paper studies a simplified form of LISYS, an artificial immune system for network
intrusion detection. The paper describes results based on a new, more controlled data set …

Negative selection and neural network based algorithm for intrusion detection in IoT

ME Pamukov, VK Poulkov… - 2018 41st International …, 2018 - ieeexplore.ieee.org
Internet of Things expands the boundaries of the Internet to encompass many devices with
constraint computational and power capabilities. This limits the implementation of security …

A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm

Z Li, T Li, J He, Y Zhu, Y Wang - Knowledge-Based Systems, 2021 - Elsevier
A negative selection algorithm generates detectors to realize abnormality detection by
simulating the maturation process of T cells in human immunity. Holes are areas of feature …

An anomaly detection algorithm inspired by the immune system

D Dasgupta, S Forrest - Artificial immune systems and their applications, 1999 - Springer
Detecting anomaly in a system or a process behavior is very important in many real-world
applications such as manufacturing, monitoring, signal processing etc. This chapter presents …

An immunological approach to change detection: Theoretical results

P D'haeseleer - Proceedings 9th IEEE Computer Security …, 1996 - ieeexplore.ieee.org
This paper examines some of the theoretical foundations of the distributable change
detection method introduced by S. Forrest et al.(1994), including fundamental bounds on …