A Machine Learning Evaluation of an Artificial Immune System

  title={A Machine Learning Evaluation of an Artificial Immune System},
  author={Matthew Glickman and Justin Balthrop and Stephanie Forrest},
  journal={Evolutionary Computation},
ARTIS is an artificial immune system framework which contains several adaptive mechanisms. LISYS is a version of ARTIS specialized for the problem of network intrusion detection. The adaptive mechanisms of LISYS are characterized in terms of their machine-learning counterparts, and a series of experiments is described, each of which isolates a different mechanism of LISYS and studies its contribution to the system's overall performance. The experiments were conducted on a new data set, which is… CONTINUE READING
Highly Cited
This paper has 53 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 31 extracted citations

Intrusion detection using principal component analysis

2010 Second International Conference on Engineering System Management and Applications • 2010
View 1 Excerpt
Highly Influenced

Application of artificial immune systems for the creation of IoT intrusion detection systems

2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) • 2017
View 1 Excerpt

53 Citations

Citations per Year
Semantic Scholar estimates that this publication has 53 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 50 references

A formal framework for positive and negative detection schemes

IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) • 2004
View 10 Excerpts
Highly Influenced

Snort: The open source network intrusion detection system

B. Caswell, M. Roesch
http://www.snort.org/, Downloaded. • 2003
View 3 Excerpts
Highly Influenced

Towards a taxonomy of intrusion-detection systems

Computer Networks • 1999
View 3 Excerpts
Highly Influenced

Network intrusion detection

View 4 Excerpts
Highly Influenced

A Network Security Monitor

IEEE Symposium on Security and Privacy • 1990
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…