Abstract
Biologically-inspired artificial immune systems (AIS) have been applied to computer virus detection systems (CVDS). A multiagent-based CVDS (ABCVDS) inspired by the danger theory of human immune system is proposed. The intelligence behind ABCVDS is based on the functionalities of dendritic cells in human immune systems. Multiple agents are embedded to this virus detection system, where agents coordinate one another to calculate mature context antigen value (MCAV). Accordingly, computer hosts undergone with malicious intrusions can be effectively detected via input signals and temporary output signals.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Hofmeyr, S., & Forrest, S. (1999). Immunity by design. In Proc. of the genetic and evolutionary computation conference (GECCO) (pp. 1289–1296).
Aickelin, U., Bentley, P., Cayzer, S., & Kim, J. (2003). Danger theory: the link between AIS and IDS. Lecture notes in computer sciences (vol. 2787, pp. 147–155).
Greensmith, J., Aickelin, J., & Cayzer, S. (2008). Detecting danger: the dendritic cell algorithm. Robust Intelligent Systems, 12, 89–112.
Fu, H., Yuan, X., & Wang, N. (2007). Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection. In International conference on computational intelligence and security workshops (pp. 570–573).
King, R., Russ, S., Lambert, A., & Reese, D. (2001). An artificial immune system model for intelligent agents. Future Generations Computer Systems, 17(4), 335–343.
Bauer, A., Beauchemin, C., & Perelson, A. (2009). Agent-based modeling of host-pathogen systems: the successes and challenges. Information Sciences, 179, 1379–1389.
Greensmith, J., Aickelin, U., & Tedesco, G. (2010). Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion, 11(1), 21–34.
Castro, L., & Timmis, J. (2003). Artificial immune systems: a new computational intelligence approach (pp. 18–27). Berlin: Springer.
Burnet, F. (1959). The clonal selection theory of acquired immunity. Cambridge: Cambridge University Press.
Jerne, N. K. (1974). Toward a network theory of the immune system. Annales D’immunologie (Paris), 125C, 373–389.
Boukerche, A., Machado, R., Juca, K., Sobral, J., & Motare, M. (2007). An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Computer Communications, 20, 2649–2660.
Jung, J. J. (2009). Knowledge distribution via shared context between blog-based knowledge management systems: a case study of collaborative tagging. Expert Systems With Applications, 36(7), 10627–10633.
Jung, J. J. (2009). Trustworthy knowledge diffusion model based on risk discovery on peer-to-peer networks. Expert Systems With Applications, 36(3), 7123–7128.
Jung, J. J. (2009). Using evolution strategy for cooperative focused crawling on semantic web. Neural Computing and Applications, 18(3), 213–221.
Yoem, K.-W. (2007). Immune-inspired algorithm for anomaly detection. Studies in computational intelligence (SCI) (vol. 57, pp. 129–154).
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., & Twycross, J. (2007). Immune system approaches to intrusion detection—a review. Natural Computing, 6, 413–466.
Greensmith, J., Feyereisl, J., & Aickelin, U. (2008). The DCA: SOMe comparison. Evolutionary Intelligence, 1(2), 85–112.
Matzinger, P. (1994). Tolerance, danger and the extended family. Annual Review of Immunology, 12, 991–1045.
Forrest, S., & Beauchemin, C. (2007). Computer immunology. Computer Communications, 20, 2649–2660.
Zhang, J., & Liang, Y. (2009). Integrating innate and adaptive immunity for worm detection. In Proceedings of the second international workshop on knowledge discovery and data mining (pp. 693–696).
Yeom, K.-W., & Park, J.-H. (2006). An artificial immune system model for multi agents based resource discovery in distributed environments. In Proceedings of the first international conference on innovative computing, information and control (vol. 1, pp. 234–239).
Gu, F., Aickelin, U., & Greensmith, J. (2007). An agent-based classification model. In 9th European agent systems summer school (EASSS2007), Durham, UK. http://arxiv.org/ftp/arxiv/papers/0910/0910.2874.pdf.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ou, CM. Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory. Telecommun Syst 52, 681–691 (2013). https://doi.org/10.1007/s11235-011-9512-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9512-6