Skip to main content

A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics

  • Conference paper
Advances in Natural Computation (ICNC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3611))

Included in the following conference series:

  • 1936 Accesses

Abstract

Dynamically evolutive models and recursive equations for self, antigen, dynamic computer forensics, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. Following that, a new model, referred to as Insdcf, for computer network surveillance and dynamic computer forensics is proposed. Simulation results show that the proposed model has the features of real-time processing, self-learning, self-adaptivity, and diversity, thus providing a good solution for computer network surveillance and dynamic computer forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moan, J.: Computer Forensics in a Global Company. In: Proc. of 16th First Conf. Computer Security Incident Handling & Response, Budapest (2004)

    Google Scholar 

  2. Yoon, A.: Network Monitoring and Web Portal Site Project in AP Region. In: Proc. of 16th First Conf. Computer Security Incident Handling & Response, Budapest (2004)

    Google Scholar 

  3. Bashaw, C.: Computer Forensics in Today’s Investigative Process. In: Proc. of 15th First Conf. Computer Security Incident Handling & Response, Ottawa (2003)

    Google Scholar 

  4. Lidz, E.L.: Network Forensics. In: Proc. of 15th First Conf. Computer Security Incident Handling & Response, Ottawa (2003)

    Google Scholar 

  5. Reis, M.A., Geus, P.L.: Standardization of Computer Forensic Protocols and Procedures. In: Proc. of 14th First Conf. Computer Security Incident Handling & Response, Hawaii, vol. 1, pp. 15–20 (2002)

    Google Scholar 

  6. Li, T.: An Introduction to Computer Network Security. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  7. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  8. Chao, D.L., Forrest, S.: Information Immune Systems. In: Conf. 1st International Conf. AIS, Canterbury, pp. 132–140 (2002)

    Google Scholar 

  9. Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 7(1), 443–473 (2000)

    Article  Google Scholar 

  10. Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Trans. Evolutionary Computation 6(3), 252–280 (2002)

    Article  Google Scholar 

  11. Forrest, S., Perelson, A.S.: Self-Nonself Discrimination in a Computer. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, pp. 202–213 (1994)

    Google Scholar 

  12. Nasaroui, O., Gonzalez, F., Cardona, C., Dasgupta, D.: A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning. In: Proc. of Genetic and Evolutionary Computation Conf., Chicago, pp. 219–230 (2003)

    Google Scholar 

  13. De Castro, L.N., Timmis, J.I.: Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing Journal 7(8), 526–544 (2003)

    Google Scholar 

  14. Kim, J., Bentley, P.J.: Towards an Artificial Immune System for Network Intrusion Detection: An investigation of Dynamic Clonal Selection. In: Proc. of the Congress on Evolutionary Computation, Honolulu, pp. 1015–1020 (2002)

    Google Scholar 

  15. Kim, J., Bentley, P.J.: Immune Memory in the Dynamic Clonal Selection Algorithm. In: Proc. of 1st International Conf. Artificial Immune System, Canterbury, pp. 57–65 (2002)

    Google Scholar 

  16. Kim, J., Bentley, P.J.: A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm. In: Proc. 1st International Conf. AIS, Canterbury, pp. 175–182 (2002)

    Google Scholar 

  17. Miller, J.: Immune Self-tolerance Mechanisms. Transplantation 72(8), S5–S9 (2001)

    Google Scholar 

  18. Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: Proc. 1st International Conf. AIS, Canterbury, pp. 89–98 (2002)

    Google Scholar 

  19. Top 75 Security Tools (August 2004), Available http://www.insecure.org/tools.html

  20. The Coroner’s Toolkit (August 2004), Available http://www.fish.com/tct

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, T., Ding, J., Liu, X., Yang, P. (2005). A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539117_113

Download citation

  • DOI: https://doi.org/10.1007/11539117_113

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28325-6

  • Online ISBN: 978-3-540-31858-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics