Next Challenges in Bringing Artificial Immune Systems to Production in Network Security
Michael HilkerPublished in: CoRR (2008)
Keyphrases
- network security
- artificial immune system
- intrusion detection
- computer networks
- intrusion detection system
- computational intelligence
- traffic analysis
- network traffic
- clonal selection
- numerical optimization
- clonal selection algorithm
- information security
- risk assessment
- anti phishing
- immune systems
- dos attacks
- anomaly detection
- genetic algorithm
- situation assessment
- swarm intelligence
- computational intelligence methods
- security protection
- computer systems
- real world
- databases