Abstract
Experiencing repeated computer virus attacks over the last decade has led to a number of intriguing technological challenges. The study of human immunology may help to solve these challenges and aid in the understanding of how and why computer viruses propagate. Current techniques employ heuristic systems to ferret the viral attacks and annihilate them. This technology is more suited for addressing known viruses and has been relatively successful. However, there remains a challenge as to how to deal with the virus problems of the near future, albeit unknown viral code. Ultimately, this paper will stimulate new innovations in anti-virus technology. This paper explores current research in the area of protection from computer viruses and suggests a possible framework for virus detection in such an autoimmune system. Hence, this paper exposes the mechanics of virus detection in the human immune system. Then it suggests techniques that could be used to identify or detect unknown viruses by distinguishing between “self” and foreigner.
Keywords
- Virtual Machine
- Intrusion Detection
- Mobile Agent
- Intelligent Agent
- Intrusion Detection System
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Spafford, E. H. 1991. Computer viruses: A form of artificial life? In D. Farmer, C. Langton, S. Rasmussen, and C. Taylor, eds., Artificial Life II. Studies in the Sciences of Complexity, 727–747. Redwood City: Addison-Wesley.
Kephart, Jeffrey O., Steve R. White, and David M. Chess. Computers and epidemiology. IEEE Spectrum, May 1993, 20–26.
Anil Somayaji, Steven Hofmeyr, Stephanie Forrest. Principles of a Computer Immune System. Department of Computer Science. University of New Mexico. Albuquerque, NM 87131
P. D’haeseleeer, S. Forrest, P. Helman. An Immunological Approach To Change Detection: Algorithms, Analysis and Implications. Preceedings Of The 1996 IEEE Symposium On Computer Security and Privacy. IEEE, 1996.
C.A. Janeway, P. Travers. Immunology: The Immune System In Health and Disease. Current Biology Ltd., London, 2nd edition, 1996.
Jeffrey O. Kephart. A Biologically Inspired Immune System, Artificial Life IV, Proceedings of the Fourth International Workshop on Synthesis and Simulatoin of Living Systems. MIT Press, Cambridge, Massachusetts, 1994, pp. 130–139.
Stephanie Forrest. Computer Immunology. University of Mexico, 1996
J.K. Percus, O. Percus, A.S. Perelson. Predicting The Size Of The Antibody Combining Region From Consideration Of Efficient self/nonself Discrimination. Proceedings Of The National Academy Of Science, 90:1691 1695, 1993.
Steve R. White. Open Problems in Computer Virus Research. Virus Bulletin Conference, Oct 22, 1998. Munich, Germany.
Martin Overton. Viruses and Lotus Notes: Have Virus Writers Finally Met Their Match. Proceedings of the Ninth International Virus Bulletin Conference, 1999, pp 149–174.
Maria Pozzo and Terence Gray. An Approach to Containing Computer Viruses. Computers and Security, v6n4, 1987, pp. 321–331.
David Aubrey-Jones. Combining Encryption with an Anti-Virus Strategy. Proceedings of the Eighth International Virus Bulletin Conference, October 1999, pp 205–234.
Wenke Lee, Salvatore J. Stolfo. Adaptive Intrusion Detection: a Data Mining Approach. Computer Science Department, Columbia University, 500 West 120th Street, New York, NY 10027.
Guy Helmer, Johnny S. K. Wong, Vasant Honavar, and Les Miller. Intelligent Agents for Intrusion Detection. Proceedings, IEEE Information Technology Conference, Syracuse, NY, September, 1998, pp. 121–124.
Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, and Robyn Lutz. Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems. Submitted to ACM Transactions on Information and System Security (TISSEC).
Wayne Jansen, Peter Mell, Tom Karygiannis, Donald Marks. Mobile Agents in Intrusion Detection and Response. Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June 2000.
Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection. Proceedings of the 7th USENIX Security Symposium, USENIX, 1998.
Baudouin Le Charlier, Abdelaziz Mounji, Morton Swimmer. Dynamic Detection And Classification Of Computer Viruses Using General Behavior Patterns. University Of Hamburg, Fachbereic Informatik Virus Test Center. Germany, July 2, 1995.
Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin. Neural Networks for Computer Virus Recognition. IEEE Expert, vol. 11, no. 4, pp. 5–6, Aug. 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deeb, K., Lewis, S. (2002). A Biological Approach to the Development of Computer Autoimmune Systems. In: Hacid, MS., Raś, Z.W., Zighed, D.A., Kodratoff, Y. (eds) Foundations of Intelligent Systems. ISMIS 2002. Lecture Notes in Computer Science(), vol 2366. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48050-1_55
Download citation
DOI: https://doi.org/10.1007/3-540-48050-1_55
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43785-7
Online ISBN: 978-3-540-48050-1
eBook Packages: Springer Book Archive
