Publication
TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection
dc.contributor.author | Antunes, Mário | |
dc.contributor.author | Correia, Manuel | |
dc.contributor.author | Antunes, Mário | |
dc.contributor.editor | ||
dc.date.accessioned | 2025-04-10T15:29:16Z | |
dc.date.available | 2025-04-10T15:29:16Z | |
dc.date.issued | 2009-01 | |
dc.description | 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008) | |
dc.description.abstract | One emergent, widely used metaphor and rich source of inspiration for computer security has been the vertebrate Immune System (IS). This is mainly due to its intrinsic nature of having to constantly protect the body against harm inflicted by external (non-self) harmful entities. The bridge between metaphor and the reality of new practical systems for anomaly detection is cemented by recent biological advancements and new proposed theories on the dynamics of immune cells by the field of theoretical immunology. In this paper we present a work in progress research on the deployment of an immune-inspired architecture, based on Grossman's Tunable Activation Threshold (TAT) hypothesis, for temporal anomaly detection, where there is a strict temporal ordering on the data, such as network intrusion detection. We start by briefly describing the overall architecture. Then, we present some preliminary results obtained in a production network. Finally, we conclude by presenting the main lines of research we intend to pursue in the near future. | eng |
dc.identifier.citation | Antunes, M., Correia, M. (2009). TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection. In: Corchado, J.M., De Paz, J.F., Rocha, M.P., Fernández Riverola, F. (eds) 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008). Advances in Soft Computing, vol 49. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85861-4_8. | |
dc.identifier.doi | 10.1007/978-3-540-85861-4_8 | |
dc.identifier.isbn | 9783540858607 | |
dc.identifier.isbn | 9783540858614 | |
dc.identifier.issn | 1615-3871 | |
dc.identifier.issn | 1860-0794 | |
dc.identifier.uri | http://hdl.handle.net/10400.8/12772 | |
dc.language.iso | eng | |
dc.peerreviewed | yes | |
dc.publisher | Springer Nature | |
dc.relation.hasversion | https://link.springer.com/chapter/10.1007/978-3-540-85861-4_8?utm_source=getftr&utm_medium=getftr&utm_campaign=getftr_pilot&getft_integrator=scopus | |
dc.relation.ispartof | Advances in Soft Computing | |
dc.relation.ispartof | 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008) | |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.subject | artificial immune system | |
dc.subject | tunable activation threshold | |
dc.subject | network intrusion detection | |
dc.subject | anomaly detection | |
dc.title | TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection | eng |
dc.type | conference paper | |
dspace.entity.type | Publication | |
oaire.citation.conferenceDate | 2008-10 | |
oaire.citation.conferencePlace | Salamanca, Spain | |
oaire.citation.endPage | 67 | |
oaire.citation.startPage | 60 | |
oaire.citation.title | Advances in Soft Computing | |
oaire.citation.volume | 49 | |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |
person.familyName | Antunes | |
person.givenName | Mário | |
person.identifier | R-000-NX4 | |
person.identifier.ciencia-id | AF10-7EDD-5153 | |
person.identifier.orcid | 0000-0003-3448-6726 | |
person.identifier.scopus-author-id | 25930820200 | |
relation.isAuthorOfPublication | e3e87fb0-d1d6-44c3-985d-920a5560f8c1 | |
relation.isAuthorOfPublication.latestForDiscovery | e3e87fb0-d1d6-44c3-985d-920a5560f8c1 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- TAT-NIDS An immune-based anomaly detection architecture for network intrusion detection.pdf
- Size:
- 6.3 MB
- Format:
- Adobe Portable Document Format
- Description:
- One emergent, widely used metaphor and rich source of inspiration for computer security has been the vertebrate Immune System (IS). This is mainly due to its intrinsic nature of having to constantly protect the body against harm inflicted by external (non-self) harmful entities. The bridge between metaphor and the reality of new practical systems for anomaly detection is cemented by recent biological advancements and new proposed theories on the dynamics of immune cells by the field of theoretical immunology. In this paper we present a work in progress research on the deployment of an immune-inspired architecture, based on Grossman's Tunable Activation Threshold (TAT) hypothesis, for temporal anomaly detection, where there is a strict temporal ordering on the data, such as network intrusion detection. We start by briefly describing the overall architecture. Then, we present some preliminary results obtained in a production network. Finally, we conclude by presenting the main lines of research we intend to pursue in the near future. © 2009 Springer-Verlag Berlin Heidelberg.
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.32 KB
- Format:
- Item-specific license agreed upon to submission
- Description: