Abstract
Biological systems employ an inherently multi-agent approach for protection from external biological assault. If properly modeled and expanded to computer networking systems, new systems for information security can be designed and adopted. These approaches would be efficient and effective at not only preventing systems failure and damage from known forms of attack, they would be able to detect and limit the damage from an unknown form of attack. In this paper, the biological system is studied and compare to a computer networking system. A simple model is also developed to aid in the study of response to an attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Janis Kuby: Immunology Second Edition, W.H. Freeman and Company, New York (1994)
Janeway, C.A., P. Travers, W. Walport, J.D. Capra: Immunobiology. The immune system in health and disease. 4th Edition. Garland Publishing, New York (1999)
Alberts, B., Bray, D., Lewis, I., Raff, M., Roberts, K., Watson, I. D.: The immune system. In: Molecular Biology of the Cell, Third Edition, Garland Publishing Inc., New York 1196 (1997)
D. Dasgupta (ed), "Artificial Immune Systems and their Applications", Springer-Verlag, (1999)
Avrameas, S. Ternynck, T.: The natural autoantibodies system: Between hypotheses and facts. Molecular Immunology, Vol. 30. (1993) 1133–1142
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Skormin, V., Moronski, J., McGee, D., Summerville, D. (2003). Biological Approach to System Information Security (BASIS): A Multi-agent Approach to Information Security. In: Mařík, V., Pěchouček, M., Müller, J. (eds) Multi-Agent Systems and Applications III. CEEMAS 2003. Lecture Notes in Computer Science(), vol 2691. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45023-8_42
Download citation
DOI: https://doi.org/10.1007/3-540-45023-8_42
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40450-7
Online ISBN: 978-3-540-45023-8
eBook Packages: Springer Book Archive