Abstract
Last two decades have witnessed tremendous growth of internet and it acts as a centrifugal force for a whole new array of applications and services which drives the e- business/ commerce globally. Millions of application has been designed to reach out to the end-user to provide necessary information. The users who are participating in various activities over internet are exposed to public network which is vulnerable to the ever growing threats like never before due to the fascination and value of information/ transaction involved. So concern about security of computer systems is justifiable, and to overcome/ prevent these threats has resulted in the development of various security concepts and products such as Firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Lately it has been witnessed that there lies a huge potential in biological algorithms and methods to solve complex real world problems, we just need to relate and model the solution based on these biological theories. This paper critically reviews the information that is available on the internet as one has to spend a considerable amount of time to search it, also it explores the possibilities of development of a biologically inspired computer security system to overcome the ever growing complex security challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marin, A.G.: Network Security Basics, Security and Privacy, pp. 68–72. IEEE (2005)
Bishop, M.: Computer Security Art and Science. Pearson Education (2003)
Zhang, X.: Intrusion Prevention System Design. In: Computer and Information Technology, pp. 386–390 (2004)
Robert, R.: CSI Computer Crime & Security Survey 2010 (2011)
Zafar, F.M., Naheed, F., Ahmad, Z., Anwar, M.M.: Network Security: A Survey of Modern Approaches. The Nucleus 45(1-2), 11–31 (2008)
Bishop, M.: An Overview of Computer Viruses in a Research Environment. In: 4th DPMA, IEEE, ACM Computer Virus and Security Conference, pp. 154–163 (1997)
Guillen, E.: Weakness and Strength Analysis over Network-Based Intrusion Prevention & Prevention Systems. Communications, 1–5 (2009)
Krause, M., Tipton, F.H.: Handbook of Information Security, Management. CRC Press LLC (2006) ISBN: 0849399475
Carter, E.: Intrusion Prevention Fundamentals: an introduction to network attack mitigation with IPS. Cisco Press (2006)
Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection & Prevention. McGraw-Hill (2004)
Denning, E.D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering SE-13(2), 222–232 (1987)
Mukerjee, B., Heberlein, T.L., Levitt, N.K.: Network Intrusion Detection. IEEE Network, 26–41 (1994)
de Castro, L., Timmis, J.: Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing, Journal 7(7), 526–544 (2003)
Dasgupta, D., Forrest, S.: An Anomaly Detection Algorithm Inspired by the Immune System. In: Artificial Immune Systems & their Applications, ch. 14, pp. 262–277. Springer-Verlag, Inc. (January 1999)
Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10), 88–96 (1997)
de Castro, L., Zuben, F.: Artificial Immune Systems: Part I – Basic Theory and Applications. TR – DCA 01/99 (1999)
Forrest, S., Hofmeyr, A.S., Somayaji, A., Longstaff: Sense of self for Unix processes. In: Proceedings of the 1996, IEEE Symposium on Security and Privacy, pp. 120–128 (1996)
Foukia, N., Hassas, S.: Managing Computer Networks Security Through Self-Organization: A Complex System Perspective. In: Di Marzo Serugendo, G., Karageorgos, A., Rana, O.F., Zambonelli, F. (eds.) ESOA 2003. LNCS (LNAI), vol. 2977, pp. 124–138. Springer, Heidelberg (2004)
Foukia, N.: IDReAM: Intrusion Detection and Response Executed with Agent Mobility. In: Brueckner, S.A., Di Marzo Serugendo, G., Karageorgos, A., Nagpal, R. (eds.) ESOA 2005. LNCS (LNAI), vol. 3464, pp. 227–239. Springer, Heidelberg (2005)
Paul, H.K., Paul, W.D., Gregg, G.H., Gary, L.B.: An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation 6(3), 252–280 (2002)
Kennedy, J., Eberhart, R.C.: Swarm Intelligence. Morgan Kaufmann, San Francisco (2001)
Birattari, Dorigo, M., Stutzle, T.: Ant colony optimization. IEEE Computational Intelligence Magazine 1(4), 28–39 (2006)
Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: IEEE International Conference on Neural Networks, pp. 1942–1948. IEEE Press, NJ (1995)
Zhang, Z., Luo, W., Wang, X.: Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the International Conference on Neural Networks and Brain, ICNN&B 2005, Beijing, vol. (2), pp. 748–753 (2005)
Ishida, Y.: The Next Generation of Immunity-Based Systems: From Specific Recognition to Computational Intelligence. In: Fulcher, J., Jain, L.C. (eds.) Computational Intelligence: A Compendium. SCI, vol. 115, pp. 1091–1121. Springer, Heidelberg (2008)
Zhongmin, C., Yu, W., Baowen, X.: The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, pp. 1779–1783 (2007)
Aickelin, U., Greensmith, J., Twycross, J.: Immune System Approaches to Intrusion Detection – A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saurabh, P., Verma, B., Sharma, S. (2012). Biologically Inspired Computer Security System: The Way Ahead. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)