Immunological approach to change detection: algorithms, analysis and implications

Patrik D'haeseleer, Stephanie Forrest, Paul Helman

Research output: Contribution to journalConference article

272 Citations (Scopus)

Abstract

We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.

Original languageEnglish (US)
Pages (from-to)110-119
Number of pages10
JournalProceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
StatePublished - Jan 1 1996
Externally publishedYes
EventProceedings of the 1996 17th IEEE Symposium on Security and Privacy - Oakland, CA, USA
Duration: May 6 1996May 8 1996

Fingerprint

Detectors
Immune system
Costs

ASJC Scopus subject areas

  • Software

Cite this

Immunological approach to change detection : algorithms, analysis and implications. / D'haeseleer, Patrik; Forrest, Stephanie; Helman, Paul.

In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 01.01.1996, p. 110-119.

Research output: Contribution to journalConference article

@article{4a8a068ec71f490ebf6c1235fb467fa4,
title = "Immunological approach to change detection: algorithms, analysis and implications",
abstract = "We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.",
author = "Patrik D'haeseleer and Stephanie Forrest and Paul Helman",
year = "1996",
month = "1",
day = "1",
language = "English (US)",
pages = "110--119",
journal = "Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy",
issn = "1063-7109",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - Immunological approach to change detection

T2 - algorithms, analysis and implications

AU - D'haeseleer, Patrik

AU - Forrest, Stephanie

AU - Helman, Paul

PY - 1996/1/1

Y1 - 1996/1/1

N2 - We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.

AB - We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provides a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.

UR - http://www.scopus.com/inward/record.url?scp=0029718285&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0029718285&partnerID=8YFLogxK

M3 - Conference article

AN - SCOPUS:0029718285

SP - 110

EP - 119

JO - Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

JF - Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

SN - 1063-7109

ER -