Skip to main content

BASIS: A Biological Approach to System Information Security

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2052))

Abstract

Advanced information security systems (ISS) play an ever-increasing role in the information assurance in global computer networks. Dependability of ISS is being achieved by the enormous amount of data processing that adversely affects the overall network performance. Modern ISS architecture is viewed as a multi-agent system comprising a number of semi-autonomous software agents designated to prevent particular kinds of threats and suppress specific types of attacks without burdening the network. The high efficiency of such a system is achieved by establishing the principles of successful individual and cooperative operation of particular agents. Such principles, evolved during evolution, are known to be implemented in biological immune systems. The aim of this paper is the exploration of the basic principles that govern an immune system and the potential implementation of these principles in a multiagent ISS of a heterogeneous computer network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Forrest, S., Hofmeyer, S.A., and Somayaji, A.: Computer Immunology. Communication of the ACM, Vol. 40,No. 10, (October 1997) 88–96

    Article  Google Scholar 

  2. Somayaji, A., Hofmeyr, S., and Forrest, S.: Principles of a Computer Immune System. 1997 New Security Paradigms Workshop, Langdale, Cumbria, UK (1997) 75–82

    Google Scholar 

  3. Crosbie, M., Spafford, E.: Active Defending of a Computer System using Autonomous Agents. Technical Report No. 95-008. COAST Group, Purdue University, (1995) 1–15

    Google Scholar 

  4. Balasubramaniyan, J., Garcia-Fernandez, J., Isakoff, D., Spafford, E., and Zamboni D.: An Architecture for Intrusion Detection using Autonomous Agents. In Proceedings of the 14th Annual Computer Security Applications Conference, Phoenix, Arizona. (December 7–11, 1998)

    Google Scholar 

  5. Kuby, J.: Immunology. 3rd Edition. W.H. Freeman and Co., New York (1997)

    Google Scholar 

  6. Janeway, C.A., Travers, P., Walport, W., and Capra, J.D.: Immunobiology. The immune system in health and disease. Garland Publishing, New York (1999)

    Google Scholar 

  7. Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., and Chan, P.K.: Jam: Java agents for meta-learning over distributed databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, (1997) 74–81

    Google Scholar 

  8. White, G., Fish, E., and Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network (January/February 1996) 20–23

    Google Scholar 

  9. Stillman, M., Marceau, C., and Stillman, M.: Intrusion Detection for Distributed Applications. Communications of the ACM, Vol. 42,No. 7, (July 99) 63–69

    Google Scholar 

  10. Warrender, C., Forrest, S., and Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. IEEE Symp. on Security and Privacy, (1999) 133–145

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Skormin, V.A. et al. (2001). BASIS: A Biological Approach to System Information Security. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-45116-1_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42103-0

  • Online ISBN: 978-3-540-45116-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics