Skip to main content

Biologically Inspired Computer Security System: The Way Ahead

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Abstract

Last two decades have witnessed tremendous growth of internet and it acts as a centrifugal force for a whole new array of applications and services which drives the e- business/ commerce globally. Millions of application has been designed to reach out to the end-user to provide necessary information. The users who are participating in various activities over internet are exposed to public network which is vulnerable to the ever growing threats like never before due to the fascination and value of information/ transaction involved. So concern about security of computer systems is justifiable, and to overcome/ prevent these threats has resulted in the development of various security concepts and products such as Firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Lately it has been witnessed that there lies a huge potential in biological algorithms and methods to solve complex real world problems, we just need to relate and model the solution based on these biological theories. This paper critically reviews the information that is available on the internet as one has to spend a considerable amount of time to search it, also it explores the possibilities of development of a biologically inspired computer security system to overcome the ever growing complex security challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marin, A.G.: Network Security Basics, Security and Privacy, pp. 68–72. IEEE (2005)

    Google Scholar 

  2. Bishop, M.: Computer Security Art and Science. Pearson Education (2003)

    Google Scholar 

  3. Zhang, X.: Intrusion Prevention System Design. In: Computer and Information Technology, pp. 386–390 (2004)

    Google Scholar 

  4. Robert, R.: CSI Computer Crime & Security Survey 2010 (2011)

    Google Scholar 

  5. Zafar, F.M., Naheed, F., Ahmad, Z., Anwar, M.M.: Network Security: A Survey of Modern Approaches. The Nucleus 45(1-2), 11–31 (2008)

    Google Scholar 

  6. Bishop, M.: An Overview of Computer Viruses in a Research Environment. In: 4th DPMA, IEEE, ACM Computer Virus and Security Conference, pp. 154–163 (1997)

    Google Scholar 

  7. Guillen, E.: Weakness and Strength Analysis over Network-Based Intrusion Prevention & Prevention Systems. Communications, 1–5 (2009)

    Google Scholar 

  8. Krause, M., Tipton, F.H.: Handbook of Information Security, Management. CRC Press LLC (2006) ISBN: 0849399475

    Google Scholar 

  9. Carter, E.: Intrusion Prevention Fundamentals: an introduction to network attack mitigation with IPS. Cisco Press (2006)

    Google Scholar 

  10. Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection & Prevention. McGraw-Hill (2004)

    Google Scholar 

  11. Denning, E.D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering SE-13(2), 222–232 (1987)

    Article  Google Scholar 

  12. Mukerjee, B., Heberlein, T.L., Levitt, N.K.: Network Intrusion Detection. IEEE Network, 26–41 (1994)

    Google Scholar 

  13. de Castro, L., Timmis, J.: Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing, Journal 7(7), 526–544 (2003)

    Article  Google Scholar 

  14. Dasgupta, D., Forrest, S.: An Anomaly Detection Algorithm Inspired by the Immune System. In: Artificial Immune Systems & their Applications, ch. 14, pp. 262–277. Springer-Verlag, Inc. (January 1999)

    Google Scholar 

  15. Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10), 88–96 (1997)

    Article  Google Scholar 

  16. de Castro, L., Zuben, F.: Artificial Immune Systems: Part I – Basic Theory and Applications. TR – DCA 01/99 (1999)

    Google Scholar 

  17. Forrest, S., Hofmeyr, A.S., Somayaji, A., Longstaff: Sense of self for Unix processes. In: Proceedings of the 1996, IEEE Symposium on Security and Privacy, pp. 120–128 (1996)

    Google Scholar 

  18. Foukia, N., Hassas, S.: Managing Computer Networks Security Through Self-Organization: A Complex System Perspective. In: Di Marzo Serugendo, G., Karageorgos, A., Rana, O.F., Zambonelli, F. (eds.) ESOA 2003. LNCS (LNAI), vol. 2977, pp. 124–138. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  19. Foukia, N.: IDReAM: Intrusion Detection and Response Executed with Agent Mobility. In: Brueckner, S.A., Di Marzo Serugendo, G., Karageorgos, A., Nagpal, R. (eds.) ESOA 2005. LNCS (LNAI), vol. 3464, pp. 227–239. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Paul, H.K., Paul, W.D., Gregg, G.H., Gary, L.B.: An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation 6(3), 252–280 (2002)

    Article  Google Scholar 

  21. Kennedy, J., Eberhart, R.C.: Swarm Intelligence. Morgan Kaufmann, San Francisco (2001)

    Google Scholar 

  22. Birattari, Dorigo, M., Stutzle, T.: Ant colony optimization. IEEE Computational Intelligence Magazine 1(4), 28–39 (2006)

    Google Scholar 

  23. Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: IEEE International Conference on Neural Networks, pp. 1942–1948. IEEE Press, NJ (1995)

    Google Scholar 

  24. Zhang, Z., Luo, W., Wang, X.: Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the International Conference on Neural Networks and Brain, ICNN&B 2005, Beijing, vol. (2), pp. 748–753 (2005)

    Google Scholar 

  25. Ishida, Y.: The Next Generation of Immunity-Based Systems: From Specific Recognition to Computational Intelligence. In: Fulcher, J., Jain, L.C. (eds.) Computational Intelligence: A Compendium. SCI, vol. 115, pp. 1091–1121. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  26. Zhongmin, C., Yu, W., Baowen, X.: The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, pp. 1779–1783 (2007)

    Google Scholar 

  27. Aickelin, U., Greensmith, J., Twycross, J.: Immune System Approaches to Intrusion Detection – A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saurabh, P., Verma, B., Sharma, S. (2012). Biologically Inspired Computer Security System: The Way Ahead. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics