Abstract
According to the nature immunology, This paper describe a computer security model imitated the principle of nature immunity, GECISM (GEneral Computer Immune System Model). The model is structured by agents. The agent imitates the immune cells. Through rules and co-operation the agent discriminate “self” and “non-self”. Further it eliminates “non-self”. The FSM model of GECISM accurately describes this system and meanwhile is the basement of performance analysis and system test about GECISM.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tong, J.-Y.: The Medicine Immunity and Microbiology, 3rd edn. The Press of People Health, Beijing (1996)
Hofmeyr, A., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 1, 45–68 (2000)
Somayaji, A.B.:Operating System Stability and Security through Process Homeostasis. Albuquerque, The University of New Mexico, New Mexico (2002)
Warrander, C.: Effective Feedback in the Immune System. In: Genetic and Evolutionary Computation Conference Workship Program, pp. 329–332. Morgan Kaufman, San Francisco (2001)
Chao, D.L., Forrest, S.: Information Immune Systems. In: ICARIS. Proceedings of the First International Conference on Artificial Immune Systems (2002)
Balthrop, J., Esponda, F., Forrest, S.(eds.): Coverage and Generalization in an Artificial Immune System. In: GECCO 2002. Proceedings of the Genetic and Evolutionary Computation Conference, Morgan Kaufmann, New York (2002)
Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 10, 88–96 (1997)
Forrest, S., Perelson, A., Allen, L.(eds.): Self-Nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 202–212. IEEE Computer Society Press, Los Alamitos (1994)
Liu, M., Ling, T.W.: A Data Model for Semistructured Data with Partial and Inconsistent Information. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 27–31. Springer, Heidelberg (2000)
Steven, A., Hofmeyr, S., Forrest, S.: Immunity by Design: An Artificial for Immune System. In: GECCO. Proceedings of the l999 Genetic and Evolutionary Computation Conference, pp. 1289–1296 (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Z., Li, A., Wang, D., Tang, W. (2007). A Computer Security Model of Imitated Nature Immune and Its FSM. In: Li, K., Fei, M., Irwin, G.W., Ma, S. (eds) Bio-Inspired Computational Intelligence and Applications. LSMS 2007. Lecture Notes in Computer Science, vol 4688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74769-7_56
Download citation
DOI: https://doi.org/10.1007/978-3-540-74769-7_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74768-0
Online ISBN: 978-3-540-74769-7
eBook Packages: Computer ScienceComputer Science (R0)