Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 156790, 11 pages
http://dx.doi.org/10.1155/2014/156790
Review Article

A Survey of Artificial Immune System Based Intrusion Detection

1College of Computer Science, Sichuan University, Chengdu 610064, China
2Computer School, China West Normal University, Nanchong 637002, China

Received 28 November 2013; Accepted 30 December 2013; Published 23 March 2014

Academic Editors: K. K. Mishra and A. K. Misra

Copyright © 2014 Hua Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [15 citations]

The following is the list of published articles that have cited the current article.

  • Daniel Hooks, Xiaohong Yuan, Kaushik Roy, Albert Esterline, and Joaquin Hernandez, “Applying Artificial Immune System for Intrusion Detection,” 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), pp. 287–292, . View at Publisher · View at Google Scholar
  • Yanjun Liu, Yongsheng Ding, Kuangrong Hao, and Lei Chen, “An immune system-inspired information diffusion model,” 2017 36th Chinese Control Conference (CCC), pp. 11238–11243, . View at Publisher · View at Google Scholar
  • Gonzalo Nápoles, Isel Grau, Rafael Falcon, Rafael Bello, and Koen Vanhoof, “A Granular Intrusion Detection System Using Rough Cognitive Networks,” Recent Advances in Computational Intelligence in Defense and Security, vol. 621, pp. 169–191, 2015. View at Publisher · View at Google Scholar
  • Mohammad Nauman, Nouman Azam, JingTao Yao, Mohammad Nauman, Nouman Azam, and JingTao Yao, “A Three-Way Decision Making Approach to Malware Analysis,” Rough Sets And Knowledge Technology, Rskt 2015, vol. 9436, pp. 286–298, 2015. View at Publisher · View at Google Scholar
  • Dong Li, Shulin Liu, and Hongli Zhang, “A boundary-fixed negative selection algorithm with online adaptive learning under small samples for anomaly detection,” Engineering Applications of Artificial Intelligence, vol. 50, pp. 93–105, 2016. View at Publisher · View at Google Scholar
  • Guangshun Yao, Yongsheng Ding, Lihong Ren, Kuangrong Hao, and Lei Chen, “An Immune System-Inspired Rescheduling Algorithm for Workflow in Cloud Systems,” Knowledge-Based Systems, 2016. View at Publisher · View at Google Scholar
  • Praneet Saurabh, and Bhupendra Verma, “An efficient proactive artificial immune system based anomaly detection and prevention system,” Expert Systems with Applications, vol. 60, pp. 311–320, 2016. View at Publisher · View at Google Scholar
  • Diogo A.B. Fernandes, Mário M. Freire, Paulo A.P. Fazendeiro, and Pedro R.M. Inácio, “Applications of artificial immune systems to computer security: A survey,” Journal of Information Security and Applications, vol. 35, pp. 138–159, 2017. View at Publisher · View at Google Scholar
  • Sidra Ijaz, Faheel A. Hashmi, Sohail Asghar, and Masoom Alam, “Vector Based Genetic Algorithm to optimize predictive analysis in network security,” Applied Intelligence, 2017. View at Publisher · View at Google Scholar
  • Guilherme Costa Silva, Walmir Matos Caminhas, and Luciano de Errico, “Dendritic Cell Algorithm Applied to Ping Scan Investigation Revisited: Detection Quality and Performance Analysis,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 1, no. 4, pp. 236–247, 2017. View at Publisher · View at Google Scholar
  • Tao Gong, Tiantian Fan, Jizheng Guo, and Zixing Cai, “GPU-based parallel optimization of immune convolutional neural network and embedded system,” Engineering Applications of Artificial Intelligence, vol. 62, pp. 384–395, 2017. View at Publisher · View at Google Scholar
  • Li Ang, Kah Seng, and Feng Ge, “Natural Inspired Intelligent Visual Computing and Its Application to Viticulture,” Sensors, vol. 17, no. 6, pp. 1186, 2017. View at Publisher · View at Google Scholar
  • Azad Chandrashekhar, and Jha Vijay Kumar, “Fuzzy Min-Max Neural Network-Based Intrusion Detection System,” Proceedings of the International Conference on Nano-electronics, Circuits & Communication Systems, vol. 403, pp. 191–202, 2017. View at Publisher · View at Google Scholar
  • I. V. Zhukovyts’kyy, and V. M. Pakhomovа, “Identifying Threats In Computer Network Based On Multilayer Neural Network,” Science and Transport Progress. Bulletin of Dnipropetrovsk National University of Railway Transport, no. 2(74), pp. 114–123, 2018. View at Publisher · View at Google Scholar
  • Mohamed Batouche, Chaouki Boufenar, and Marc Schoenauer, “An artificial immune system for offline isolated handwritten arabic character recognition,” Evolving Systems, vol. 9, no. 1, pp. 25–41, 2018. View at Publisher · View at Google Scholar