The immune system is an impressive information processing system with many appealing properties for solving problems. Artificial immune systems are a paradigm inspired by the immune system and are used for solving computational and information processing problems. In this paper, we outline two different immune-inspired approaches typically used for IT-security problems. Specifically, we present one of the first proposed immune inspired approaches for network intrusion detection, this is then complimented with an overview of recent investigations on the latest immunological theories and how they may be exploited in IT-security. We then present an artificial immune system concept for database security which encompasses issues such as confidentiality of database information and prevention of privacy-preserving data mining.
it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view.