An artificial immune system architecture for computer security applications

被引:185
|
作者
Harmer, PK [1 ]
Williams, PD
Gunsch, GH
Lamont, GB
机构
[1] USAF, Res Lab, Wright Patterson AFB, OH 45433 USA
[2] Air Intelligence Agcy, Lackland AFB, TX 78236 USA
[3] USAF, Inst Technol, Wright Patterson AFB, OH 45433 USA
关键词
agents; artificial immune system; computer security; computer virus; intrusion detection;
D O I
10.1109/TEVC.2002.1011540
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral stains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture. A prototype interactive system is designed, implemented in Java, and tested. The results validate the use of a distributed-agent biological-system approach toward the computer-security problems of virus elimination and ID.
引用
收藏
页码:252 / 280
页数:29
相关论文
共 50 条
  • [41] Immune System and Artificial Immune System Application
    Li Chengwei
    Peng Hui
    Xu Aijun
    Wang Shoubin
    WORLD CONGRESS ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING 2006, VOL 14, PTS 1-6, 2007, 14 : 477 - +
  • [42] Security applications and architecture for an open market
    Hirsch, P
    Lee, S
    IEEE COMPUTER APPLICATIONS IN POWER, 1999, 12 (03): : 26 - 31
  • [43] A security architecture for electronic commerce applications
    De Win, B
    Van den Bergh, J
    Matthijs, F
    De Decker, B
    Joosen, W
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 491 - 500
  • [44] Merging Computer Log Files for Process Mining: An Artificial Immune System Technique
    Claes, Jan
    Poels, Geert
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT I, 2012, 99 : 99 - 110
  • [45] Optimal Solution for an Engineering Applications Using Modified Artificial Immune System
    Padmanabhan, S.
    Chandrasekaran, M.
    Ganesan, S.
    Patan, Mahamed Naveed Khan
    Navakanth, Polina
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING RESEARCH, 2017, 183
  • [46] A Security Architecture Based on Immune Agents for MANET
    Ye, Xia
    Li, Junshan
    2010 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR COMPUTING, 2010, : 19 - 23
  • [47] Applications of artificial intelligence in cyber security
    Vaishnav, Pragya
    Raja, Linesh
    Singh, Poonam
    Tandel, Swapnali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1367 - 1375
  • [48] Design and implementation of computer network security protection system based on artificial intelligence technology
    Liu, Cheng
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023, 8 (02) : 1491 - 1508
  • [49] Design of Computer Network Security Defense System Based on Artificial Intelligence and Neural Network
    Bian, Lu
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [50] A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture
    Bagga, Pallavi
    Hans, Rahul
    Sharma, Vipul
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 72 : 269 - 282