Abstract
We design a network security system using an analogy of natural world immunology. We adopt an immune mechanism that distinguishes self or non-self and cooperation among immune cells of the system. This system implements each immune cell as an agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Balthrop, S. Forrest and M. Glickman, Revisiting LISYS: Parameters and Normal Behavior, Proceedings of the 2002 Congress on Evolutionary Computation (in press).
W. DuMouchel, Computer intrusion detection based on Bay es Factors for comparing command transition probabilities, National Institut e of Statistical Sciences Technical Report, 1999.
S. Forrest, S. A. Hofmeyr and A. Somayaji, Computer Immunology, Communications of the ACM, Vol. 40, No. 10, pp. 88–96, 1997.
S. Forrest, A.S. Perelson, L. Allen and R. Cherukuri, Self-Nonself Discrimination in a Computer, In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994.
Yumiko Hanaoka, Goichiro Hanaoka and Hideki Imai, Artificial Immune System: A New Model of Anomaly Detection and Its Methods of Implementation, Computer Security Symposium 2000, pp. 231–236, 2000.
S. A. Hofmeyr and S. Forrest, Architecture for an artificial immune system, Evolutionary Computation, 7(1), pp. 45–68, 2000.
T. Lane and C. E. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, ACM Transactions on Information and System Security, 2(3), pp. 295–331, 1999.
Fumio Mizoguchi, Anomaly Detection Using Visualization and Machine Learning, Proc. of the Ninth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Workshop: Enterprise Security), pp. 165–170, 2000.
Peter G. Neumann and Phillip A. Porras, Experience with EMERALD to DATE, Usenix Workshop on Intrusion Detecion, 1999.
H. Nishiyama, H. Ohwada and F. Mizoguchi, A Multiaget Robot Language for Communication and Concurrency Control, International Conference on Multiagent Systems, pp. 206–213, 1998.
Tomio Tada, Semantics of immunology (in Japanease), Seidosha, 1993.
A. Taguchi, et al, The Study and Implementation for Tracing Intruder by Mobile Agent, and Intrusion Detection using Marks, Proc. of the 1999 Synposium on Cryptography and Information Security, pp. 627–632, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nishiyama, H., Mizoguchi, F. (2003). Design and Implementation of Security System Based on Immune System. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_15
Download citation
DOI: https://doi.org/10.1007/3-540-36532-X_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00708-1
Online ISBN: 978-3-540-36532-7
eBook Packages: Springer Book Archive