Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection.
Marek ZielinskiPublished in: ISSA (2004)
Keyphrases
- intrusion detection
- mobile agent system
- immune systems
- intrusion detection system
- anomaly detection
- mobile agents
- network security
- network intrusion detection
- network traffic
- data mining
- detecting anomalous
- fault tolerance
- fault tolerant
- security mechanisms
- communication networks
- information security
- distributed systems
- computational systems
- intrusion prevention
- neural network
- artificial immune system
- data mining techniques
- computer networks
- particle swarm optimization
- information systems
- machine learning
- network intrusions
- databases