Research Article

An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection

Table 1

AIS vs. IDS.

ItemsAISIDS

Entity in detection processAntigenic determinantBehavior mode of the detected strings
Receivers—the chromosome or organ that needs to be checkedNormal-mode strings
Single clone lymphocyteA detector placed at the security monitoring boundary
AntigenNonself string
Behavior representation of detectionBinding—the response of an antibody to an antigenMatch between normal-mode strings and nonself strings
Behavioral confirmationNegative selection
Clone of lymphocytesDuplication of detectors
Detection of antigensDetection of network traffic behavior
Cleaning antigensResponse action of detectors