Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MM_2007_19_12_a0, author = {A. V. Krizhanovsky and A. M. Marasanov}, title = {Synthesizing of intrusion prevention system based on the association of human immune system and operating system}, journal = {Matemati\v{c}eskoe modelirovanie}, pages = {3--12}, publisher = {mathdoc}, volume = {19}, number = {12}, year = {2007}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MM_2007_19_12_a0/} }
TY - JOUR AU - A. V. Krizhanovsky AU - A. M. Marasanov TI - Synthesizing of intrusion prevention system based on the association of human immune system and operating system JO - Matematičeskoe modelirovanie PY - 2007 SP - 3 EP - 12 VL - 19 IS - 12 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MM_2007_19_12_a0/ LA - ru ID - MM_2007_19_12_a0 ER -
%0 Journal Article %A A. V. Krizhanovsky %A A. M. Marasanov %T Synthesizing of intrusion prevention system based on the association of human immune system and operating system %J Matematičeskoe modelirovanie %D 2007 %P 3-12 %V 19 %N 12 %I mathdoc %U http://geodesic.mathdoc.fr/item/MM_2007_19_12_a0/ %G ru %F MM_2007_19_12_a0
A. V. Krizhanovsky; A. M. Marasanov. Synthesizing of intrusion prevention system based on the association of human immune system and operating system. Matematičeskoe modelirovanie, Tome 19 (2007) no. 12, pp. 3-12. http://geodesic.mathdoc.fr/item/MM_2007_19_12_a0/
[1] U. Aickelin, J. Greensmith, J. Twycross, Immune System Approaches to Intrusion Detection, Review, School of Computer Science, University of Nottingham, 2004
[2] D. Dasgupta, F. A. Gonzalez, “An Immunity-Based Technique to Characterize Intrusions in Computer Networks”, IEEE Transactions on Evolutionary Computation, 2002, 1081–1088
[3] F. A. Gonzalez, D. Dasgupta, “Anomaly Detection Using Real-Valued Negative Selection”, Journal of Genetic Programming and Evolvable Machines, 2003, 383–403 | DOI
[4] A. Somayaji, S. Forrest, “Automated Response Using System-Call Delays”, Proceedings of the 9th USENIX Security Symposium, 2000
[5] P. Matzinger, The Real Function of the Immune System or Tolerance and Four D's (Danger, Death, Destruction and Distress), http://cmmg.biosci.wayne.edu/asg/polly.html
[6] S. M. Garret, “How Do We Evaluate Artificial Immune Systems?”, Evolutionary Computation, 13:2 (2005), 145–178 | DOI
[7] J. Kim, P. Bentley, “An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection”, Genetic and Evolutionary Computation Conference (GECCO-2001), 2001, 1330–1337
[8] U. Aickelin, P. Bentley, S. Cayzer, J. Kim, J. McLeod, “Danger Theory: The Link between AIS and IDS?”, Second International Conference on Artificial Immune Systems (ICARIS-2003) (Edinburgh, UK), 2003, 147–155
[9] U. Aickelin, S. Cayzer, “The Danger Theory and Its Application to AIS”, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS-2002), 2002, 141–148
[10] T. H. Ptacek, T. N. Newshman, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks Inc., 1998
[11] J. Kim, Integrating Artificial Immune Algorithms for Intrusion Detection, PhD thesis, Dept. of Computer Science, University College London, July 2002
[12] Elektronnaya entsiklopediya “Biologiya cheloveka. Immunologiya”, http://obi.img.ras.ru/humbio/
[13] L. N. de Castro, J. Timmis, “Artificial Immune Systems: A Novel Paradigm to Pattern Recognition”, Artificial Neural Networks in Pattern Recognition, SOCO-2002 (University of Paisley, UK), 67–84
[14] J. Kim, P. Bentley, “Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection”, Proceedings of the Congress on Evolutionary Computation (CEC-2002) (Honolulu, May 2002), 1015–1020
[15] M. M. Williamson, Biologically-Inspired Approaches to Computer Security, Technical Report HPL-2002-131, HP Labs, Bristol, UK, 2002
[16] S. Forrest, S. Hofmer, A. Somayaji, T. Longstaff, “A Sense of Self for UNIX processes”, Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, IEEE Press, 1996
[17] Snort Intrusion Detection System, http://www.snort.org
[18] Vulnerability description, http://www.securiteam.com/exploits/5AP041F8VA. html
[19] S. N. Chari, P. C. Cheng, BlueBoX: A Policy-driven, Host-Based Intrusion Detection System, IBM Thomas J. Watson Research Center, NDSS, 2002
[20] G. Navarro, “NR-grep: a fast and flexible pattern matching tool”, Software Practice and Experience (SPE), 2001, 1265–1312 | DOI | Zbl
[21] G. Navarro, M. Raffinot, “Compat DFA representation for fast regular expression search”, Proceedings of the 5th Workshop on Algorithm Engineering (WAE'01), LNCS 2141, 2001, 1–12 | MR | Zbl
[22] G. Navarro, M. Raffinot, “New Techniques for Regular Expression Searching”, Algorithmica, 41:2 (2004), 89–116 | DOI | MR