2021
DOI: 10.1007/s10207-021-00550-x
|View full text |Cite
|
Sign up to set email alerts
|

ISM-AC: an immune security model based on alert correlation and software-defined networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…Kodati et al (2023) described an ensemble framework of artificial immune system (AIS) based on network intrusion detection system [18]. Melo et al (2022) inspired by the human immune system and proposed an immune security model, ISM-AC, which based on alert correlation and software-defined networking [19]. Sanders et al (2019) mentioned in their research that traditional methods treat network security and public safety protection methods as independent of each other, managed by different departments, and responded to by different technical means [20].…”
Section: Introductionmentioning
confidence: 99%
“…Kodati et al (2023) described an ensemble framework of artificial immune system (AIS) based on network intrusion detection system [18]. Melo et al (2022) inspired by the human immune system and proposed an immune security model, ISM-AC, which based on alert correlation and software-defined networking [19]. Sanders et al (2019) mentioned in their research that traditional methods treat network security and public safety protection methods as independent of each other, managed by different departments, and responded to by different technical means [20].…”
Section: Introductionmentioning
confidence: 99%
“…Kodati et al (2023) described an ensemble framework of the artificial immune system (AIS) based on a network intrusion detection system [18]. Melo et al (2022) were inspired by the human immune system and proposed an immune security model, ISM-AC, which is based on alert correlation and software-defined networking [19]. Sanders et al (2019) mentioned in their research that traditional methods treat cybersecurity and public safety protection methods as independent of each other, managed by different departments, and responded to by different technical means [20].…”
Section: Introductionmentioning
confidence: 99%
“…Statistical traffic estimation-the main application of this estimation is to detect alerts, which are regularly repeated to find their repetition pattern. The patterns of occurred alerts are recognized, and the repetition pattern is derived based on the statistical data of each alert and detects the dissimilarity with these patterns in the future [51,52].…”
mentioning
confidence: 99%