Table of ContentsDistributed Network Intrusion DetectionAn Immunological ApproachSteven HofmeyrStephanie ForrestPatrik D’haeseleer Dept. of Computer Science University of New MexicoAlbuquerque, NM{steveah, forrest, patrik}@cs.unm.eduhttp://cs.unm.edu/~steveah/research.html Introduction Background: Defining Self The Biological Viewpoint How the Immune System Distributes Detection The Negative Selection Algorithm Applying Negative Detection to Network Traffic PPT Slide Experimental Setup Experimental Results The Problem of Incomplete Self Sets(Suppose the training set is incomplete) Experimental ResultsIntrusions with and without permutation masks Experimental and Theoretical Results:Permutation Masks Overcome the Hole Limit Pushing the Immune Metaphor |
Author: Valued Customer |