An artificial immune system architecture for computer security applications

被引:185
|
作者
Harmer, PK [1 ]
Williams, PD
Gunsch, GH
Lamont, GB
机构
[1] USAF, Res Lab, Wright Patterson AFB, OH 45433 USA
[2] Air Intelligence Agcy, Lackland AFB, TX 78236 USA
[3] USAF, Inst Technol, Wright Patterson AFB, OH 45433 USA
关键词
agents; artificial immune system; computer security; computer virus; intrusion detection;
D O I
10.1109/TEVC.2002.1011540
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral stains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture. A prototype interactive system is designed, implemented in Java, and tested. The results validate the use of a distributed-agent biological-system approach toward the computer-security problems of virus elimination and ID.
引用
收藏
页码:252 / 280
页数:29
相关论文
共 50 条
  • [1] Applications of artificial immune systems to computer security: A survey
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Fazendeiro, Paulo A. P.
    Inacio, Pedro R. M.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 138 - 159
  • [2] An artificial immune system architecture and its applications
    Sun, WD
    Tang, Z
    Tamura, H
    Ishii, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (07) : 1858 - 1868
  • [3] An integrated security architecture basing on Artificial Immune System for LAN
    Guo Jiandong
    Qin Zhiguang
    Guo Jianxin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1408 - +
  • [4] Intelligent agent based artificial immune system for computer security—a review
    Sivakumar Ramakrishnan
    Sujatha Srinivasan
    Artificial Intelligence Review, 2009, 32 : 13 - 43
  • [5] Architecture for an Artificial Immune System
    Hofmeyr, Steven A.
    Forrest, Stephanie
    EVOLUTIONARY COMPUTATION, 2000, 8 (04) : 443 - 473
  • [6] Intelligent agent based artificial immune system for computer security-a review
    Ramakrishnan, Sivakumar
    Srinivasan, Sujatha
    ARTIFICIAL INTELLIGENCE REVIEW, 2009, 32 (1-4) : 13 - 43
  • [7] A hierarchical artificial immune architecture and its applications
    Sun, WD
    Tang, Z
    Tamura, H
    Ishii, M
    SICE 2003 ANNUAL CONFERENCE, VOLS 1-3, 2003, : 3265 - 3270
  • [8] Applications of artificial immune system algorithm
    Carlos, Jose
    Diaz, Maita
    Salas, Maria
    BULLETIN OF COMPUTATIONAL APPLIED MATHEMATICS, 2019, 7 (01): : 15 - 22
  • [9] Network security evaluation based on artificial immune system
    Yang, J.
    Li, T.
    Jiang, Y. P.
    Liang, G.
    Liu, S. J.
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 3035 - 3040
  • [10] Mobile Agent Security Based on Artificial Immune System
    Brahmi, Zaki
    Lini, Amine
    Gammoudi, Mohamed Mohsen
    INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 385 - 395