Design and Implementation of Security System Based on Immune System
We design a network security system using an analogy of natural world immunology. We adopt an immune mechanism that distinguishes self or non-self and cooperation among immune cells of the system. This system implements each immune cell as an agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.
Unable to display preview. Download preview PDF.
- 1.J. Balthrop, S. Forrest and M. Glickman, Revisiting LISYS: Parameters and Normal Behavior, Proceedings of the 2002 Congress on Evolutionary Computation (in press).Google Scholar
- 2.W. DuMouchel, Computer intrusion detection based on Bay es Factors for comparing command transition probabilities, National Institut e of Statistical Sciences Technical Report, 1999.Google Scholar
- 4.S. Forrest, A.S. Perelson, L. Allen and R. Cherukuri, Self-Nonself Discrimination in a Computer, In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994.Google Scholar
- 5.Yumiko Hanaoka, Goichiro Hanaoka and Hideki Imai, Artificial Immune System: A New Model of Anomaly Detection and Its Methods of Implementation, Computer Security Symposium 2000, pp. 231–236, 2000.Google Scholar
- 6.S. A. Hofmeyr and S. Forrest, Architecture for an artificial immune system, Evolutionary Computation, 7(1), pp. 45–68, 2000.Google Scholar
- 8.Fumio Mizoguchi, Anomaly Detection Using Visualization and Machine Learning, Proc. of the Ninth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Workshop: Enterprise Security), pp. 165–170, 2000.Google Scholar
- 9.Peter G. Neumann and Phillip A. Porras, Experience with EMERALD to DATE, Usenix Workshop on Intrusion Detecion, 1999.Google Scholar
- 10.H. Nishiyama, H. Ohwada and F. Mizoguchi, A Multiaget Robot Language for Communication and Concurrency Control, International Conference on Multiagent Systems, pp. 206–213, 1998.Google Scholar
- 11.Tomio Tada, Semantics of immunology (in Japanease), Seidosha, 1993.Google Scholar
- 12.A. Taguchi, et al, The Study and Implementation for Tracing Intruder by Mobile Agent, and Intrusion Detection using Marks, Proc. of the 1999 Synposium on Cryptography and Information Security, pp. 627–632, 1999.Google Scholar