Abstract
Bio-inspired approach for network security is appealing because of the obvious analogies between the security of network systems and the survival of biological species. However, nearly all the existing researches only focus on some facets of network security using partial security mechanisms of biosystem. In this paper, a comprehensive bio-inspired model for network security is proposed to fully exhibit the performances by which the biology achieves security. The analysis shows that the model can not only provide a framework for researchers but also offer some new research angles for pursuers in the field.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Forrest, S., Perelson, A.S.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, 5 (1994)
Forrest, S., Somayaji, A., Ackley, D.H.: Building Diverse Computer Systems. In: Workshop on Hot Topics in Operating Systems, pp. 67–72 (1997)
Kephart, J.O., White, S.R.: Directed Graph Epidemiological models of Computer Viruses. In: Proceedings of the 1991 IEEE Computer Security Symposium on Research in Security and Privacy, Oakland California, vol. 5, pp. 343–359 (1991)
Somayaji, A., Forrest, S.: Automated Response using System-call Delays. In: Proceedings of the 9th USENIX Security Symposium, pp. 185–197 (2000)
Dasgupta, D.: An Immune-based Technique to Characterize Intrusions in Computer Networks. IEEE Transactions on Evolutionary Computation, 6 (2002)
Williamson, M.M., Léveillé, J.: An Epidemiological Model of Virus Spread and Cleanup. Hewlett-Packard, 12 (2003)
Bradley, D., Tyrrell, A.: Embryonics+Immunotronics: A Bio-inspired Approach to Fault Tolerance, http://www.amp.york.ac.uk/external/media
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Hq., Wang, J., Zhao, Gs. (2006). A New Bio-inspired Model for Network Security and Its Application. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_102
Download citation
DOI: https://doi.org/10.1007/11610496_102
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)