Abstract
Dynamically evolutive models and recursive equations for self, antigen, dynamic computer forensics, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. Following that, a new model, referred to as Insdcf, for computer network surveillance and dynamic computer forensics is proposed. Simulation results show that the proposed model has the features of real-time processing, self-learning, self-adaptivity, and diversity, thus providing a good solution for computer network surveillance and dynamic computer forensics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moan, J.: Computer Forensics in a Global Company. In: Proc. of 16th First Conf. Computer Security Incident Handling & Response, Budapest (2004)
Yoon, A.: Network Monitoring and Web Portal Site Project in AP Region. In: Proc. of 16th First Conf. Computer Security Incident Handling & Response, Budapest (2004)
Bashaw, C.: Computer Forensics in Today’s Investigative Process. In: Proc. of 15th First Conf. Computer Security Incident Handling & Response, Ottawa (2003)
Lidz, E.L.: Network Forensics. In: Proc. of 15th First Conf. Computer Security Incident Handling & Response, Ottawa (2003)
Reis, M.A., Geus, P.L.: Standardization of Computer Forensic Protocols and Procedures. In: Proc. of 14th First Conf. Computer Security Incident Handling & Response, Hawaii, vol. 1, pp. 15–20 (2002)
Li, T.: An Introduction to Computer Network Security. Publishing House of Electronics Industry, Beijing (2004)
Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)
Chao, D.L., Forrest, S.: Information Immune Systems. In: Conf. 1st International Conf. AIS, Canterbury, pp. 132–140 (2002)
Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 7(1), 443–473 (2000)
Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Trans. Evolutionary Computation 6(3), 252–280 (2002)
Forrest, S., Perelson, A.S.: Self-Nonself Discrimination in a Computer. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, pp. 202–213 (1994)
Nasaroui, O., Gonzalez, F., Cardona, C., Dasgupta, D.: A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning. In: Proc. of Genetic and Evolutionary Computation Conf., Chicago, pp. 219–230 (2003)
De Castro, L.N., Timmis, J.I.: Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing Journal 7(8), 526–544 (2003)
Kim, J., Bentley, P.J.: Towards an Artificial Immune System for Network Intrusion Detection: An investigation of Dynamic Clonal Selection. In: Proc. of the Congress on Evolutionary Computation, Honolulu, pp. 1015–1020 (2002)
Kim, J., Bentley, P.J.: Immune Memory in the Dynamic Clonal Selection Algorithm. In: Proc. of 1st International Conf. Artificial Immune System, Canterbury, pp. 57–65 (2002)
Kim, J., Bentley, P.J.: A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm. In: Proc. 1st International Conf. AIS, Canterbury, pp. 175–182 (2002)
Miller, J.: Immune Self-tolerance Mechanisms. Transplantation 72(8), S5–S9 (2001)
Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: Proc. 1st International Conf. AIS, Canterbury, pp. 89–98 (2002)
Top 75 Security Tools (August 2004), Available http://www.insecure.org/tools.html
The Coroner’s Toolkit (August 2004), Available http://www.fish.com/tct
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, T., Ding, J., Liu, X., Yang, P. (2005). A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539117_113
Download citation
DOI: https://doi.org/10.1007/11539117_113
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28325-6
Online ISBN: 978-3-540-31858-3
eBook Packages: Computer ScienceComputer Science (R0)