Abstract
The immune system is an impressive information processing system with many appealing properties for solving problems. Artificial immune systems are a paradigm inspired by the immune system and are used for solving computational and information processing problems. In this paper, we outline two different immune-inspired approaches typically used for IT-security problems. Specifically, we present one of the first proposed immune inspired approaches for network intrusion detection, this is then complimented with an overview of recent investigations on the latest immunological theories and how they may be exploited in IT-security. We then present an artificial immune system concept for database security which encompasses issues such as confidentiality of database information and prevention of privacy-preserving data mining.
| Translated title of the contribution | Artificial Immune Systems for IT-Security |
|---|---|
| Original language | English |
| Pages (from-to) | 168-173 |
| Number of pages | 6 |
| Journal | IT - Information Technology |
| Volume | 48 |
| Issue number | 3 |
| DOIs | |
| State | Published - 1 Mar 2006 |
| Externally published | Yes |
Keywords
- Artificial Immune Systems
- Computer Security
- Database Security
- Intrusion Detection
Fingerprint
Dive into the research topics of 'Artificial Immune Systems for IT-Security'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver