Skip to main content

Study of Immune Control Computing in Immune Detection Algorithm for Information Security

  • Conference paper
Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence (ICIC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5227))

Included in the following conference series:

Abstract

Based on research for anomaly detection and immune control mechanism in the biological immune principles, a method of immune control computing is introduced in immune detection. Such problems as immune detection model and immune memory are discussed. The experiments that are in the area of intrusion detection are made. Shown by experiments, the algorithm joined immune control computing provides a dynamitic detecting way and keeps stability of detection. Its detecting efficiency is increased obviously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marrack, P., Kappler, J.W.: How the immune system recognizes the body. Scientific American 269(3), 81–89 (1993)

    Article  Google Scholar 

  2. Forrest, S., Perelson, A.S., Allen, L.R., et al.: Self-nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 271–281. IEEE Computer Society Press, Los Alamitos (1994)

    Google Scholar 

  3. D’haeseleer, P., Forrest, S., Helman, P.: An Immunological Approach to Change Detection: Algorithms, Analysis, and Implications. In: Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, pp. 98–109 (1996)

    Google Scholar 

  4. Chen, W.Q., Zhou, J.Z., et al.: Compensatory Controller Based on Artificial Immune System. In: International Conference on Mechatronics and Automation, pp. 1608–1613 (2006)

    Google Scholar 

  5. Zhang, Y.J., Yang, X., Wu, S.H.: A Gene Immune Detection Algorithm with a Strategy of DNA PRI. In: 2004 International Conference on Machine Learning and Cybernetics, pp. 476–481 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Donald C. Wunsch II Daniel S. Levine Kang-Hyun Jo

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y.J., Xue, Y. (2008). Study of Immune Control Computing in Immune Detection Algorithm for Information Security. In: Huang, DS., Wunsch, D.C., Levine, D.S., Jo, KH. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2008. Lecture Notes in Computer Science(), vol 5227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85984-0_114

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85984-0_114

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85983-3

  • Online ISBN: 978-3-540-85984-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics