Abstract
The immune system is an impressive information processing system with many appealing properties for solving problems. Artificial immune systems are a paradigm inspired by the immune system and are used for solving computational and information processing problems. In this paper, we outline two different immune-inspired approaches typically used for IT-security problems. Specifically, we present one of the first proposed immune inspired approaches for network intrusion detection, this is then complimented with an overview of recent investigations on the latest immunological theories and how they may be exploited in IT-security. We then present an artificial immune system concept for database security which encompasses issues such as confidentiality of database information and prevention of privacy-preserving data mining.
Original language | English |
---|---|
Pages (from-to) | 168-173 |
Number of pages | 6 |
Journal | IT - Information Technology |
Volume | 48 |
Issue number | 3 |
DOIs | |
Publication status | Published - 01 Mar 2006 |
Keywords
- Artificial Immune Systems
- Computer Security
- Database Security
- Intrusion Detection