Skip to main content

A Computer Security Model of Imitated Nature Immune and Its FSM

  • Conference paper
Bio-Inspired Computational Intelligence and Applications (LSMS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4688))

Included in the following conference series:

  • 1392 Accesses

Abstract

According to the nature immunology, This paper describe a computer security model imitated the principle of nature immunity, GECISM (GEneral Computer Immune System Model). The model is structured by agents. The agent imitates the immune cells. Through rules and co-operation the agent discriminate “self” and “non-self”. Further it eliminates “non-self”. The FSM model of GECISM accurately describes this system and meanwhile is the basement of performance analysis and system test about GECISM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tong, J.-Y.: The Medicine Immunity and Microbiology, 3rd edn. The Press of People Health, Beijing (1996)

    Google Scholar 

  2. Hofmeyr, A., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 1, 45–68 (2000)

    Google Scholar 

  3. Somayaji, A.B.:Operating System Stability and Security through Process Homeostasis. Albuquerque, The University of New Mexico, New Mexico (2002)

    Google Scholar 

  4. Warrander, C.: Effective Feedback in the Immune System. In: Genetic and Evolutionary Computation Conference Workship Program, pp. 329–332. Morgan Kaufman, San Francisco (2001)

    Google Scholar 

  5. Chao, D.L., Forrest, S.: Information Immune Systems. In: ICARIS. Proceedings of the First International Conference on Artificial Immune Systems (2002)

    Google Scholar 

  6. Balthrop, J., Esponda, F., Forrest, S.(eds.): Coverage and Generalization in an Artificial Immune System. In: GECCO 2002. Proceedings of the Genetic and Evolutionary Computation Conference, Morgan Kaufmann, New York (2002)

    Google Scholar 

  7. Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 10, 88–96 (1997)

    Article  Google Scholar 

  8. Forrest, S., Perelson, A., Allen, L.(eds.): Self-Nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 202–212. IEEE Computer Society Press, Los Alamitos (1994)

    Google Scholar 

  9. Liu, M., Ling, T.W.: A Data Model for Semistructured Data with Partial and Inconsistent Information. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 27–31. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Steven, A., Hofmeyr, S., Forrest, S.: Immunity by Design: An Artificial for Immune System. In: GECCO. Proceedings of the l999 Genetic and Evolutionary Computation Conference, pp. 1289–1296 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kang Li Minrui Fei George William Irwin Shiwei Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Z., Li, A., Wang, D., Tang, W. (2007). A Computer Security Model of Imitated Nature Immune and Its FSM. In: Li, K., Fei, M., Irwin, G.W., Ma, S. (eds) Bio-Inspired Computational Intelligence and Applications. LSMS 2007. Lecture Notes in Computer Science, vol 4688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74769-7_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74769-7_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74768-0

  • Online ISBN: 978-3-540-74769-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics