2022
DOI: 10.1016/j.asoc.2022.109680
|View full text |Cite
|
Sign up to set email alerts
|

A generic cyber immune framework for anomaly detection using artificial immune systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…The majority of previous works on immune-inspired IDSs target computer networks [ 192 , 193 ], IoT devices [ 187 ], or CPSs [ 188 ]. In additions, several works apply immune principles to IDSs applicable to WSNs, such as the negative selection-based IDS for WSNs named WSN-NSA [ 183 ], the multi-level IDS for WSNs [ 73 ], or Co-FAIS [ 135 ], a danger-theory-based IDS that utilizes fuzzified network traffic in WSNs.…”
Section: Literature Review On Immune-inspired Approachesmentioning
confidence: 99%
“…The majority of previous works on immune-inspired IDSs target computer networks [ 192 , 193 ], IoT devices [ 187 ], or CPSs [ 188 ]. In additions, several works apply immune principles to IDSs applicable to WSNs, such as the negative selection-based IDS for WSNs named WSN-NSA [ 183 ], the multi-level IDS for WSNs [ 73 ], or Co-FAIS [ 135 ], a danger-theory-based IDS that utilizes fuzzified network traffic in WSNs.…”
Section: Literature Review On Immune-inspired Approachesmentioning
confidence: 99%
“…The detection system called cyber immune system (CIS) designed by Bejoy et al ( 2022 ) was tested on the NSL-KDD dataset, combining the negative selection algorithm with the positive selection algorithm. If the CIS detector identifies a regular traffic pattern, it is removed using negative selection.…”
Section: Metaheuristics Machine Learning and Anomaly Detectionmentioning
confidence: 99%
“…This suggests that ongoing learning based on continually updated signatures of self and attack is a key principle of defense. Indeed these and other immune-inspired principles have been translated into many artificial immune systems for intrusion detection [78].…”
Section: Open Questions: What (Combinations Of) Defensive Layers Mini...mentioning
confidence: 99%