Abstract:
Artificial immune systems can be used to detect intrusion by classifying network activities as normal or abnormal. High detection rates and low false positive rates are t...Show MoreMetadata
Abstract:
Artificial immune systems can be used to detect intrusion by classifying network activities as normal or abnormal. High detection rates and low false positive rates are two necessary features of successful AIS. Strong detectors are the basis of creating a successful AIS. Some preliminary experiments showed its promise to encode detectors in the form of data triples. Currently, there are two types of detectors: binary-coded and constraint-based. This paper compares the two types of detectors using simulated network traffic data. The results show that constraint-based detectors perform better than binary-coded detectors.
Date of Conference: 19-23 June 2004
Date Added to IEEE Xplore: 03 September 2004
Print ISBN:0-7803-8515-2