Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/525080.884257acmconferencesArticle/Chapter ViewAbstractPublication PagesspConference Proceedingsconference-collections
Article

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications

Published: 06 May 1996 Publication History

Abstract

We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
May 1996
ISBN:0818674172

Sponsors

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 May 1996

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Novel immune-based framework for securing ad hoc networksProceedings of the 2010 ACM Symposium on Applied Computing10.1145/1774088.1774502(1950-1957)Online publication date: 22-Mar-2010
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2009)Hybrid detector based negative selection algorithmProceedings of the 5th International Conference on Wireless communications, networking and mobile computing10.5555/1738467.1738534(4392-4395)Online publication date: 24-Sep-2009
  • (2009)Applying Kernel methods to anomaly based intrusion detection systemsProceedings of the Second international conference on Global Information Infrastructure Symposium10.5555/1719570.1719622(318-321)Online publication date: 22-Jun-2009
  • (2009)P2P-AISProceedings of the Second international conference on Global Information Infrastructure Symposium10.5555/1719570.1719621(314-317)Online publication date: 22-Jun-2009
  • (2009)Configuration of and Interaction Between Information Security TechnologiesInformation Systems Research10.1287/isre.1080.018020:2(198-217)Online publication date: 1-Jun-2009
  • (2009)On average time complexity of evolutionary negative selection algorithms for anomaly detectionProceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation10.1145/1543834.1543920(631-638)Online publication date: 12-Jun-2009
  • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009
  • (2009)V-detectorInformation Sciences: an International Journal10.1016/j.ins.2008.12.015179:10(1390-1406)Online publication date: 20-Apr-2009
  • (2009)Immune K-means and negative selection algorithms for data analysisInformation Sciences: an International Journal10.1016/j.ins.2008.10.034179:10(1407-1425)Online publication date: 20-Apr-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media