A charged PSO inspired method for generating immune detectors for network intrusion detection

Mark Heydenrych, Elizabeth Marie Ehlers

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

This paper will present a method for generating immune detectors inspired by the working of charged particle swarm optimisation and negative selection in the artificial immune system. The paper will also test the efficiency of the proposed method against a benchmark in order to prove that the proposed method is superior to stochastic generation.

Original languageEnglish
Title of host publicationProc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011
Pages134-141
Number of pages8
DOIs
Publication statusPublished - 2011
Event10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011 - Changsha, China
Duration: 16 Nov 201118 Nov 2011

Publication series

NameProc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011

Conference

Conference10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011
Country/TerritoryChina
CityChangsha
Period16/11/1118/11/11

Keywords

  • immune
  • negative selection
  • network intrusion detection

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'A charged PSO inspired method for generating immune detectors for network intrusion detection'. Together they form a unique fingerprint.

Cite this