Skip to main content

Advertisement

Log in

Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Biologically-inspired artificial immune systems (AIS) have been applied to computer virus detection systems (CVDS). A multiagent-based CVDS (ABCVDS) inspired by the danger theory of human immune system is proposed. The intelligence behind ABCVDS is based on the functionalities of dendritic cells in human immune systems. Multiple agents are embedded to this virus detection system, where agents coordinate one another to calculate mature context antigen value (MCAV). Accordingly, computer hosts undergone with malicious intrusions can be effectively detected via input signals and temporary output signals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hofmeyr, S., & Forrest, S. (1999). Immunity by design. In Proc. of the genetic and evolutionary computation conference (GECCO) (pp. 1289–1296).

    Google Scholar 

  2. Aickelin, U., Bentley, P., Cayzer, S., & Kim, J. (2003). Danger theory: the link between AIS and IDS. Lecture notes in computer sciences (vol. 2787, pp. 147–155).

    Google Scholar 

  3. Greensmith, J., Aickelin, J., & Cayzer, S. (2008). Detecting danger: the dendritic cell algorithm. Robust Intelligent Systems, 12, 89–112.

    Article  Google Scholar 

  4. Fu, H., Yuan, X., & Wang, N. (2007). Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection. In International conference on computational intelligence and security workshops (pp. 570–573).

    Google Scholar 

  5. King, R., Russ, S., Lambert, A., & Reese, D. (2001). An artificial immune system model for intelligent agents. Future Generations Computer Systems, 17(4), 335–343.

    Article  Google Scholar 

  6. Bauer, A., Beauchemin, C., & Perelson, A. (2009). Agent-based modeling of host-pathogen systems: the successes and challenges. Information Sciences, 179, 1379–1389.

    Article  Google Scholar 

  7. Greensmith, J., Aickelin, U., & Tedesco, G. (2010). Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion, 11(1), 21–34.

    Article  Google Scholar 

  8. Castro, L., & Timmis, J. (2003). Artificial immune systems: a new computational intelligence approach (pp. 18–27). Berlin: Springer.

    Google Scholar 

  9. Burnet, F. (1959). The clonal selection theory of acquired immunity. Cambridge: Cambridge University Press.

    Google Scholar 

  10. Jerne, N. K. (1974). Toward a network theory of the immune system. Annales D’immunologie (Paris), 125C, 373–389.

    Google Scholar 

  11. Boukerche, A., Machado, R., Juca, K., Sobral, J., & Motare, M. (2007). An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Computer Communications, 20, 2649–2660.

    Article  Google Scholar 

  12. Jung, J. J. (2009). Knowledge distribution via shared context between blog-based knowledge management systems: a case study of collaborative tagging. Expert Systems With Applications, 36(7), 10627–10633.

    Article  Google Scholar 

  13. Jung, J. J. (2009). Trustworthy knowledge diffusion model based on risk discovery on peer-to-peer networks. Expert Systems With Applications, 36(3), 7123–7128.

    Article  Google Scholar 

  14. Jung, J. J. (2009). Using evolution strategy for cooperative focused crawling on semantic web. Neural Computing and Applications, 18(3), 213–221.

    Article  Google Scholar 

  15. Yoem, K.-W. (2007). Immune-inspired algorithm for anomaly detection. Studies in computational intelligence (SCI) (vol. 57, pp. 129–154).

    Google Scholar 

  16. Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., & Twycross, J. (2007). Immune system approaches to intrusion detection—a review. Natural Computing, 6, 413–466.

    Article  Google Scholar 

  17. Greensmith, J., Feyereisl, J., & Aickelin, U. (2008). The DCA: SOMe comparison. Evolutionary Intelligence, 1(2), 85–112.

    Article  Google Scholar 

  18. Matzinger, P. (1994). Tolerance, danger and the extended family. Annual Review of Immunology, 12, 991–1045.

    Article  Google Scholar 

  19. Forrest, S., & Beauchemin, C. (2007). Computer immunology. Computer Communications, 20, 2649–2660.

    Google Scholar 

  20. Zhang, J., & Liang, Y. (2009). Integrating innate and adaptive immunity for worm detection. In Proceedings of the second international workshop on knowledge discovery and data mining (pp. 693–696).

    Google Scholar 

  21. Yeom, K.-W., & Park, J.-H. (2006). An artificial immune system model for multi agents based resource discovery in distributed environments. In Proceedings of the first international conference on innovative computing, information and control (vol. 1, pp. 234–239).

    Google Scholar 

  22. Gu, F., Aickelin, U., & Greensmith, J. (2007). An agent-based classification model. In 9th European agent systems summer school (EASSS2007), Durham, UK. http://arxiv.org/ftp/arxiv/papers/0910/0910.2874.pdf.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chung-Ming Ou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ou, CM. Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory. Telecommun Syst 52, 681–691 (2013). https://doi.org/10.1007/s11235-011-9512-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9512-6

Keywords

Navigation