Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System.
Ossama ToutonjiSeong-Moo YooPublished in: Security and Management (2009)
Keyphrases
- computer networks
- network traffic
- countermeasures
- network security
- security problems
- computer systems
- communication networks
- intrusion detection system
- network management
- tcp ip
- dos attacks
- artificial immune system
- intrusion detection
- information security
- probabilistic model
- network monitoring
- real world
- anomaly detection
- reinforcement learning
- information retrieval