Biological Inspired Approach in Parallel Immunology System for Network Security

被引:0
|
作者
Elsadig, Muna [1 ]
Abdullah, Azween [1 ]
机构
[1] Univ Teknol PETRONAS, Dept Comp & Informat Sci, Tronoh, Malaysia
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biologically - inspired computer security has various techniques to solve the problems that facing computer networks security, such as immune system, diversity, danger theory, virus Epidemiology and nonrepresentational approaches. Immune Systems are fairly complex with some unique schemes and are thus a rich source of concepts, which are applicable to a variety of problems. In this paper a new framework together with a set of paradigms for adaptive immune virtual layers implemented by multi-mobile agents based active monitoring of network systems is proposed Multi-mobile agents combine features of adaptation, self defending and self monitoring of human immune system, that works in parallel with decentralizes control. Adaptive immune virtual layers system could be implemented by Kernel -assisted mobile agents (processes) that migrate between computers and search for a specific abnormal behavior, and take necessary actions: monitoring each other, detecting attacks, eliminating, circulating, and replicating themselves.
引用
收藏
页码:111 / 116
页数:6
相关论文
共 50 条
  • [21] Security defense of information system based on artificial immunology
    Xiao, Yi
    Xiao, Ming
    Zhao, Hui
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 960 - 966
  • [22] A parallel approach for improving data security
    Karthikeyan, S.
    Sairam, N.
    Manikandan, G.
    Sivaguru, J.
    Journal of Theoretical and Applied Information Technology, 2012, 39 (02) : 119 - 125
  • [23] A bio-inspired multidimensional Network Security model
    Wang, Huiqiang
    Zheng, Ruijuan
    Li, Xueyao
    Liu, Daxin
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 3 - +
  • [24] Immune Inspired Framework for Ad Hoc Network Security
    Mohamed, Yasir Abdelgadir
    Abdullah, Azween B.
    2009 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-3, 2009, : 297 - 302
  • [25] An agent based and biological inspired real-time intrusion detection and security model for computer network operations
    Boukerche, Azzedine
    Machado, Renato B.
    Juca, Kathia R. L.
    Sobral, Joao Bosco M.
    Notare, Mirela S. M. A.
    COMPUTER COMMUNICATIONS, 2007, 30 (13) : 2649 - 2660
  • [26] A Notion of Biological Diagnosability Inspired by the Notion of Opacity in Systems Security
    Barbuti, Roberto
    Maggiolo-Schettini, Andrea
    Milazzo, Paolo
    Gruska, Damas P.
    FUNDAMENTA INFORMATICAE, 2010, 102 (01) : 19 - 34
  • [27] 'Window of visibility' inspired security lighting system
    Zhang, Yi
    Zhai, Guangtao
    Liu, Jing
    Weng, Xinlin
    Chen, Yuanchun
    2017 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP), 2017,
  • [28] A Dynamic Neural Network Architecture with Immunology Inspired Optimization for Weather Data Forecasting
    Hussain, Abir Jaafar
    Liatsis, Panos
    Khalaf, Mohammed
    Tawfik, Hissam
    Al-Asker, Haya
    BIG DATA RESEARCH, 2018, 14 : 81 - 92
  • [29] Network and system security
    Zhou, Wanlei
    Yang Xiang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (02) : 345 - 346
  • [30] An approach to network security evaluation of computer network information system with triangular fuzzy information
    Guo, Jin-cheng
    Fan, Dan
    Che, Hao-yuan
    Duan, Yun-na
    Wang, Hong-Su
    Zhang, Da-Wei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (05) : 2029 - 2035