Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1251972.1252326guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Revisiting LISYS: parameters and normal behavior

Published: 12 May 2002 Publication History

Abstract

This paper studies a simplified form of LISYS, an artificial immune system for network intrusion detection. The paper describes results based on a new, more controlled data set than that used for earlier studies. The paper also looks at which parameters appear most important for minimizing false positives, as well as the trade-offs and relationships among parameter settings.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CEC '02: Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
May 2002
1034 pages
ISBN:0780372824

Publisher

IEEE Computer Society

United States

Publication History

Published: 12 May 2002

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Hybrid email spam detection model with negative selection algorithm and differential evolutionEngineering Applications of Artificial Intelligence10.1016/j.engappai.2013.12.00128(97-110)Online publication date: 1-Feb-2014
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2009)Foundations of r-contiguous matching in negative selection for anomaly detectionNatural Computing: an international journal10.1007/s11047-008-9097-58:3(613-641)Online publication date: 1-Sep-2009
  • (2008)A hybrid artificial immune system and Self Organising Map for network intrusion detectionInformation Sciences: an International Journal10.1016/j.ins.2007.11.028178:15(3024-3042)Online publication date: 1-Aug-2008
  • (2007)Is AIS Based Misbehavior Detection Suitable for Wireless Sensor Networks?Proceedings of the 2007 IEEE Wireless Communications and Networking Conference10.1109/WCNC.2007.578(3128-3133)Online publication date: 1-Mar-2007
  • (2007)Learning DFA representations of HTTP for protecting web applicationsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2006.09.01651:5(1239-1255)Online publication date: 1-Apr-2007
  • (2007)Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackersApplied Soft Computing10.1016/j.asoc.2006.05.0017:2(547-553)Online publication date: 1-Mar-2007
  • (2006)An evaluation of negative selection algorithm with constraint-based detectorsProceedings of the 44th annual ACM Southeast Conference10.1145/1185448.1185479(134-139)Online publication date: 10-Mar-2006
  • (2006)Theoretical basis of novelty detection in time series using negative selection algorithmsProceedings of the 5th international conference on Artificial Immune Systems10.1007/11823940_29(376-389)Online publication date: 4-Sep-2006
  • (2005)A Machine Learning Evaluation of an Artificial Immune SystemEvolutionary Computation10.1162/106365605408850313:2(179-212)Online publication date: 1-Jun-2005
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media