Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 57))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Forrest S. Hofmeyr S. Somayaji A. Computer immunology. Communications of the ACM, 40(10), (1997).

    Google Scholar 

  2. Shortman K. Caux C. Dendritic cell development: multiple pathways to nature’s adjuvants. Stem Cells, 15:409-419, (1997).

    Article  Google Scholar 

  3. Shortman K. Caux C. Dendritic cells and t lymphocytes: developmental and functional interactions. Ciba Found Symp, 204:130-141, (1997).

    Google Scholar 

  4. Dasgupta D. An overview of artificial immune systems. Artificial Immune Systems and Their Applications, (1999).

    Google Scholar 

  5. deCastro L. N. and Timmis J. Artificial immune systems a new computational intelligence approach. Springer, (2002).

    Google Scholar 

  6. Satthaporn S. EreminO. Dendritic cells (i) : biological functions. Journal of the Royal College of Surgeons of Edinburgh : Scientific Review, 46(1), (2001).

    Google Scholar 

  7. Steven Hofmeyr. An immunological model of distributed detection and its application to computer security. PhD thesis, (1999).

    Google Scholar 

  8. Martien L. Kapsenberg. Dendritic-cell control of pathogen-driven t-cell polarization. Nature Reviews in Immunology, 3:984-993, December (2003).

    Article  Google Scholar 

  9. Williamson M. M. Throttling viruses. restricting propagation to defeat malicious mobile code. Technical Report of HP Laboratories Bristol,, HPL-2002-172, 2002.

    Google Scholar 

  10. Anderson C. Matzinger P. Danger: The view from the bottom of the cliff. Seminars in Immunology, 12(3):231-238, 2000.

    Article  Google Scholar 

  11. Matzinger P. An innate sense of danger. Seminars in Immunology, 10(5):399-415,(1998).

    Article  Google Scholar 

  12. Matzinger P. The danger model: A renewed sense of self. Science, 296:301-305, (2002).

    Article  Google Scholar 

  13. G. J. et al. Randolph. Differentiation of monocytes into dendritic cells in a model of transendothelial trafficking see comments. Science, 282:480-483, (1998).

    Google Scholar 

  14. Percus Jerome K. Ora E. Alan S. Predicting the size of the t-cell receptor and antibody combining region from consideration of efficient self non-self discrimination. Proceedings of the National Academy of Sciences of the United States of America, 90:1691-1695, (1993).

    Article  Google Scholar 

  15. Greensmith J. Aickelin U. Jamie T. Detecting danger. applying a novel immunological concept to intrusion detection systems. 6th International Conference in Design and Manufacture, (2004).

    Google Scholar 

  16. Aickelin U. and Cayzer S. The danger theory and its application to artificial immune systems. In proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), pages 141-148, (2002).

    Google Scholar 

  17. Jamie T. Aickelin U. Towards a conceptual framework for innate immunity. Proceedings of the 4th International Conference on Artificial Immune Systems, (2004).

    Google Scholar 

  18. William R. Heath Jose A. Villadangos. No driving without a license. Nature Immunology, 6(2):125-126, (2005).

    Article  Google Scholar 

  19. Jansen W. Intrusion detection with mobile agents. Computer Communications, 25(15),(2002).

    Google Scholar 

  20. Riley G. F. Sharif M. I. Lee W. Simulating internet worms. Proceedings of IEEE/ACM MASCOTS 2004, (2004).

    Google Scholar 

  21. Ki-Won Yeom and Ji-Hyung Park. An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless adhoc network. Lecture Notes in Artificial Intelligence, 3802:204-211, (2005).

    Google Scholar 

  22. Steinman R. Cohn Z. Identification of a novel cell type in peripheral lymphoid organs of mice. The Journal of Experimental Medicine, 137:1142-1162, (1973).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yeom, KW. (2007). Immune-inspired Algorithm for Anomaly Detection. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71078-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71077-6

  • Online ISBN: 978-3-540-71078-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics