Skip to main navigation Skip to search Skip to main content

Artificial immune systems - AIS as security network solution

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Network security attacks have a dynamical performance and their rate of change is commonly faster than protection technologies. The defense mechanisms usually act with reactive non proactive solutions in a non-self learning procedure. However, bio-inspired methods such as AIS could give a new dynamical method to defend entire data network from malicious attacks. This short paper briefly analyzes the possible use of AIS in secure network architectures to be implemented with future research projects.

Original languageEnglish
Title of host publicationBio-Inspired Models of Network, Information, and Computing Systems - 5th International ICST Conference, BIONETICS 2010, Revised Selected Papers
Pages680-681
Number of pages2
DOIs
StatePublished - 2012
Event5th International ICST Conference on Bio-Inspired Models of Network, Information, and Computing Systems, BIONETICS 2010 - Boston, MA, United States
Duration: 01 Dec 201003 Dec 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume87 LNICST
ISSN (Print)1867-8211

Conference

Conference5th International ICST Conference on Bio-Inspired Models of Network, Information, and Computing Systems, BIONETICS 2010
Country/TerritoryUnited States
CityBoston, MA
Period01/12/1003/12/10

Keywords

  • AIS
  • BIS
  • Network Security

Fingerprint

Dive into the research topics of 'Artificial immune systems - AIS as security network solution'. Together they form a unique fingerprint.

Cite this