An Artificial Immune System Based on Intelligent Agents

Article Preview

Abstract:

The use of immune systems in intrusion detection has been a hot spot of research for the past decade. Immune systems have many features that are desirable for the imperfect, uncontrolled, and open environments in which most computers currently exist. It is hoped that biologically inspired approaches in this area, including the use of intelligent agents will be able to meet this challenge. In this paper, we extract some useful mechanisms from natural biological systems together with the use of intelligent agents, in order to develop cost effective computational solutions to complex problems in artificial immune systems. Analysis and evaluation of the system shows that it is robust, fault-tolerant and has low error rate and high detection rate as well.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

673-676

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Jones and R. Sielken, Computer Intrusion Detection: A Survey, University of Virginia, Computer Science Technical Report, (2000).

Google Scholar

[2] Timmis J. Artificial immune systems-today and tomorrow, Nat Comput, 2007, 6.

Google Scholar

[3] Tao Gong, Zixing Cai, Visual Modeling and Simulation of Adaptive Immune System, Engineering in Medicine and Biology 27th Annual Conference, Shanghai, China, September 1-4, (2005).

DOI: 10.1109/iembs.2005.1615889

Google Scholar

[4] S. Chandrasekaran, C. Dinesh, AL. Murugappan, An Artificial Immune Networking Using Intelligent Agents, Proceedings of the World Congress on Engineering 2008 Vol I.

Google Scholar

[5] D. Dasgupta and H. Brian, Mobile Security Agents for Network Traffic Analysis", Proceedings of DARPA Information Survivability Conference & Exposition II, 2001. DISCEX , 01, Volume: 2, 2001, p.332–340.

DOI: 10.1109/discex.2001.932184

Google Scholar

[6] Carver, C., J. Hill, J. Surdu, and U. Pooch, A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response, IEEE Systems, Man, and Cybemetics Information Assurance and Security Workshop, West Point, NY, June (2000).

Google Scholar