An artificial immune system architecture for computer security applications

被引:185
作者
Harmer, PK [1 ]
Williams, PD
Gunsch, GH
Lamont, GB
机构
[1] USAF, Res Lab, Wright Patterson AFB, OH 45433 USA
[2] Air Intelligence Agcy, Lackland AFB, TX 78236 USA
[3] USAF, Inst Technol, Wright Patterson AFB, OH 45433 USA
关键词
agents; artificial immune system; computer security; computer virus; intrusion detection;
D O I
10.1109/TEVC.2002.1011540
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral stains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture. A prototype interactive system is designed, implemented in Java, and tested. The results validate the use of a distributed-agent biological-system approach toward the computer-security problems of virus elimination and ID.
引用
收藏
页码:252 / 280
页数:29
相关论文
共 51 条
  • [1] EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH
    AHO, AV
    CORASICK, MJ
    [J]. COMMUNICATIONS OF THE ACM, 1975, 18 (06) : 333 - 340
  • [2] [Anonymous], LITTLE BLACK BOOK CO
  • [3] [Anonymous], P NEW SEC PAR C GREA
  • [4] [Anonymous], P 4 INT WORKSH SYNTH
  • [5] *BACK OR, 1999, CULT DEAD COW
  • [6] BARR RS, 1996, J HEURISTICS, V1, P9
  • [7] Benjamini E, 1996, IMMUNOLOGY SHORT COU
  • [8] BURRIDGE R, 1999, JAVA SHARED DATA TOO
  • [9] CARDINALE KJ, 1999, THESIS AIR FORC I TE
  • [10] COHEN FB, 1994, SHROT COURSE COMPUTE