Repository logo
 
Publication

TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection

dc.contributor.authorAntunes, Mário
dc.contributor.authorCorreia, Manuel
dc.contributor.authorAntunes, Mário
dc.contributor.editor
dc.date.accessioned2025-04-10T15:29:16Z
dc.date.available2025-04-10T15:29:16Z
dc.date.issued2009-01
dc.description2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008)
dc.description.abstractOne emergent, widely used metaphor and rich source of inspiration for computer security has been the vertebrate Immune System (IS). This is mainly due to its intrinsic nature of having to constantly protect the body against harm inflicted by external (non-self) harmful entities. The bridge between metaphor and the reality of new practical systems for anomaly detection is cemented by recent biological advancements and new proposed theories on the dynamics of immune cells by the field of theoretical immunology. In this paper we present a work in progress research on the deployment of an immune-inspired architecture, based on Grossman's Tunable Activation Threshold (TAT) hypothesis, for temporal anomaly detection, where there is a strict temporal ordering on the data, such as network intrusion detection. We start by briefly describing the overall architecture. Then, we present some preliminary results obtained in a production network. Finally, we conclude by presenting the main lines of research we intend to pursue in the near future.eng
dc.identifier.citationAntunes, M., Correia, M. (2009). TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection. In: Corchado, J.M., De Paz, J.F., Rocha, M.P., Fernández Riverola, F. (eds) 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008). Advances in Soft Computing, vol 49. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85861-4_8.
dc.identifier.doi10.1007/978-3-540-85861-4_8
dc.identifier.isbn9783540858607
dc.identifier.isbn9783540858614
dc.identifier.issn1615-3871
dc.identifier.issn1860-0794
dc.identifier.urihttp://hdl.handle.net/10400.8/12772
dc.language.isoeng
dc.peerreviewedyes
dc.publisherSpringer Nature
dc.relation.hasversionhttps://link.springer.com/chapter/10.1007/978-3-540-85861-4_8?utm_source=getftr&utm_medium=getftr&utm_campaign=getftr_pilot&getft_integrator=scopus
dc.relation.ispartofAdvances in Soft Computing
dc.relation.ispartof2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008)
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectartificial immune system
dc.subjecttunable activation threshold
dc.subjectnetwork intrusion detection
dc.subjectanomaly detection
dc.titleTAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detectioneng
dc.typeconference paper
dspace.entity.typePublication
oaire.citation.conferenceDate2008-10
oaire.citation.conferencePlaceSalamanca, Spain
oaire.citation.endPage67
oaire.citation.startPage60
oaire.citation.titleAdvances in Soft Computing
oaire.citation.volume49
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.familyNameAntunes
person.givenNameMário
person.identifierR-000-NX4
person.identifier.ciencia-idAF10-7EDD-5153
person.identifier.orcid0000-0003-3448-6726
person.identifier.scopus-author-id25930820200
relation.isAuthorOfPublicatione3e87fb0-d1d6-44c3-985d-920a5560f8c1
relation.isAuthorOfPublication.latestForDiscoverye3e87fb0-d1d6-44c3-985d-920a5560f8c1

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TAT-NIDS An immune-based anomaly detection architecture for network intrusion detection.pdf
Size:
6.3 MB
Format:
Adobe Portable Document Format
Description:
One emergent, widely used metaphor and rich source of inspiration for computer security has been the vertebrate Immune System (IS). This is mainly due to its intrinsic nature of having to constantly protect the body against harm inflicted by external (non-self) harmful entities. The bridge between metaphor and the reality of new practical systems for anomaly detection is cemented by recent biological advancements and new proposed theories on the dynamics of immune cells by the field of theoretical immunology. In this paper we present a work in progress research on the deployment of an immune-inspired architecture, based on Grossman's Tunable Activation Threshold (TAT) hypothesis, for temporal anomaly detection, where there is a strict temporal ordering on the data, such as network intrusion detection. We start by briefly describing the overall architecture. Then, we present some preliminary results obtained in a production network. Finally, we conclude by presenting the main lines of research we intend to pursue in the near future. © 2009 Springer-Verlag Berlin Heidelberg.
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.32 KB
Format:
Item-specific license agreed upon to submission
Description: