Skip to main content

A Biological Approach to the Development of Computer Autoimmune Systems

  • 653 Accesses

Part of the Lecture Notes in Computer Science book series (LNAI,volume 2366)

Abstract

Experiencing repeated computer virus attacks over the last decade has led to a number of intriguing technological challenges. The study of human immunology may help to solve these challenges and aid in the understanding of how and why computer viruses propagate. Current techniques employ heuristic systems to ferret the viral attacks and annihilate them. This technology is more suited for addressing known viruses and has been relatively successful. However, there remains a challenge as to how to deal with the virus problems of the near future, albeit unknown viral code. Ultimately, this paper will stimulate new innovations in anti-virus technology. This paper explores current research in the area of protection from computer viruses and suggests a possible framework for virus detection in such an autoimmune system. Hence, this paper exposes the mechanics of virus detection in the human immune system. Then it suggests techniques that could be used to identify or detect unknown viruses by distinguishing between “self” and foreigner.

Keywords

  • Virtual Machine
  • Intrusion Detection
  • Mobile Agent
  • Intelligent Agent
  • Intrusion Detection System

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Spafford, E. H. 1991. Computer viruses: A form of artificial life? In D. Farmer, C. Langton, S. Rasmussen, and C. Taylor, eds., Artificial Life II. Studies in the Sciences of Complexity, 727–747. Redwood City: Addison-Wesley.

    Google Scholar 

  2. Kephart, Jeffrey O., Steve R. White, and David M. Chess. Computers and epidemiology. IEEE Spectrum, May 1993, 20–26.

    Google Scholar 

  3. Anil Somayaji, Steven Hofmeyr, Stephanie Forrest. Principles of a Computer Immune System. Department of Computer Science. University of New Mexico. Albuquerque, NM 87131

    Google Scholar 

  4. P. D’haeseleeer, S. Forrest, P. Helman. An Immunological Approach To Change Detection: Algorithms, Analysis and Implications. Preceedings Of The 1996 IEEE Symposium On Computer Security and Privacy. IEEE, 1996.

    Google Scholar 

  5. C.A. Janeway, P. Travers. Immunology: The Immune System In Health and Disease. Current Biology Ltd., London, 2nd edition, 1996.

    Google Scholar 

  6. Jeffrey O. Kephart. A Biologically Inspired Immune System, Artificial Life IV, Proceedings of the Fourth International Workshop on Synthesis and Simulatoin of Living Systems. MIT Press, Cambridge, Massachusetts, 1994, pp. 130–139.

    Google Scholar 

  7. Stephanie Forrest. Computer Immunology. University of Mexico, 1996

    Google Scholar 

  8. J.K. Percus, O. Percus, A.S. Perelson. Predicting The Size Of The Antibody Combining Region From Consideration Of Efficient self/nonself Discrimination. Proceedings Of The National Academy Of Science, 90:1691 1695, 1993.

    CrossRef  Google Scholar 

  9. http://vmware1.m0.net/m/s.asp?HB4162878203X1075673X73339X

  10. Steve R. White. Open Problems in Computer Virus Research. Virus Bulletin Conference, Oct 22, 1998. Munich, Germany.

    Google Scholar 

  11. Martin Overton. Viruses and Lotus Notes: Have Virus Writers Finally Met Their Match. Proceedings of the Ninth International Virus Bulletin Conference, 1999, pp 149–174.

    Google Scholar 

  12. Maria Pozzo and Terence Gray. An Approach to Containing Computer Viruses. Computers and Security, v6n4, 1987, pp. 321–331.

    CrossRef  Google Scholar 

  13. David Aubrey-Jones. Combining Encryption with an Anti-Virus Strategy. Proceedings of the Eighth International Virus Bulletin Conference, October 1999, pp 205–234.

    Google Scholar 

  14. Wenke Lee, Salvatore J. Stolfo. Adaptive Intrusion Detection: a Data Mining Approach. Computer Science Department, Columbia University, 500 West 120th Street, New York, NY 10027.

    Google Scholar 

  15. Guy Helmer, Johnny S. K. Wong, Vasant Honavar, and Les Miller. Intelligent Agents for Intrusion Detection. Proceedings, IEEE Information Technology Conference, Syracuse, NY, September, 1998, pp. 121–124.

    Google Scholar 

  16. Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, and Robyn Lutz. Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems. Submitted to ACM Transactions on Information and System Security (TISSEC).

    Google Scholar 

  17. Wayne Jansen, Peter Mell, Tom Karygiannis, Donald Marks. Mobile Agents in Intrusion Detection and Response. Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June 2000.

    Google Scholar 

  18. Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection. Proceedings of the 7th USENIX Security Symposium, USENIX, 1998.

    Google Scholar 

  19. Baudouin Le Charlier, Abdelaziz Mounji, Morton Swimmer. Dynamic Detection And Classification Of Computer Viruses Using General Behavior Patterns. University Of Hamburg, Fachbereic Informatik Virus Test Center. Germany, July 2, 1995.

    Google Scholar 

  20. Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin. Neural Networks for Computer Virus Recognition. IEEE Expert, vol. 11, no. 4, pp. 5–6, Aug. 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deeb, K., Lewis, S. (2002). A Biological Approach to the Development of Computer Autoimmune Systems. In: Hacid, MS., Raś, Z.W., Zighed, D.A., Kodratoff, Y. (eds) Foundations of Intelligent Systems. ISMIS 2002. Lecture Notes in Computer Science(), vol 2366. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48050-1_55

Download citation

  • DOI: https://doi.org/10.1007/3-540-48050-1_55

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43785-7

  • Online ISBN: 978-3-540-48050-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics