Skip to main content

Design and Implementation of Security System Based on Immune System

  • Conference paper
  • First Online:
Software Security — Theories and Systems (ISSS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2609))

Included in the following conference series:

Abstract

We design a network security system using an analogy of natural world immunology. We adopt an immune mechanism that distinguishes self or non-self and cooperation among immune cells of the system. This system implements each immune cell as an agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Balthrop, S. Forrest and M. Glickman, Revisiting LISYS: Parameters and Normal Behavior, Proceedings of the 2002 Congress on Evolutionary Computation (in press).

    Google Scholar 

  2. W. DuMouchel, Computer intrusion detection based on Bay es Factors for comparing command transition probabilities, National Institut e of Statistical Sciences Technical Report, 1999.

    Google Scholar 

  3. S. Forrest, S. A. Hofmeyr and A. Somayaji, Computer Immunology, Communications of the ACM, Vol. 40, No. 10, pp. 88–96, 1997.

    Article  Google Scholar 

  4. S. Forrest, A.S. Perelson, L. Allen and R. Cherukuri, Self-Nonself Discrimination in a Computer, In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994.

    Google Scholar 

  5. Yumiko Hanaoka, Goichiro Hanaoka and Hideki Imai, Artificial Immune System: A New Model of Anomaly Detection and Its Methods of Implementation, Computer Security Symposium 2000, pp. 231–236, 2000.

    Google Scholar 

  6. S. A. Hofmeyr and S. Forrest, Architecture for an artificial immune system, Evolutionary Computation, 7(1), pp. 45–68, 2000.

    Google Scholar 

  7. T. Lane and C. E. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, ACM Transactions on Information and System Security, 2(3), pp. 295–331, 1999.

    Article  Google Scholar 

  8. Fumio Mizoguchi, Anomaly Detection Using Visualization and Machine Learning, Proc. of the Ninth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Workshop: Enterprise Security), pp. 165–170, 2000.

    Google Scholar 

  9. Peter G. Neumann and Phillip A. Porras, Experience with EMERALD to DATE, Usenix Workshop on Intrusion Detecion, 1999.

    Google Scholar 

  10. H. Nishiyama, H. Ohwada and F. Mizoguchi, A Multiaget Robot Language for Communication and Concurrency Control, International Conference on Multiagent Systems, pp. 206–213, 1998.

    Google Scholar 

  11. Tomio Tada, Semantics of immunology (in Japanease), Seidosha, 1993.

    Google Scholar 

  12. A. Taguchi, et al, The Study and Implementation for Tracing Intruder by Mobile Agent, and Intrusion Detection using Marks, Proc. of the 1999 Synposium on Cryptography and Information Security, pp. 627–632, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nishiyama, H., Mizoguchi, F. (2003). Design and Implementation of Security System Based on Immune System. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-36532-X_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00708-1

  • Online ISBN: 978-3-540-36532-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics