Review Article

A Survey of Artificial Immune System Based Intrusion Detection

Table 1

Time and space complexities of all detector generating algorithms [48].

AlgorithmTimeSpace

Exhaustive
Linear
Greedy
NSMutation