Title :
An artificial immune system architecture for computer security applications
Author :
Harmer, Paul K. ; Williams, Paul D. ; Gunsch, Gregg H. ; Lamont, Gary B.
Author_Institution :
Air Force Res. Lab., Wright-Patterson AFB, OH, USA
fDate :
6/1/2002 12:00:00 AM
Abstract :
With increased global interconnectivity and reliance on e-commerce, network services and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current anti-virus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral strains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture. A prototype interactive system is designed, implemented in Java and tested. The results validate the use of a distributed-agent biological system approach toward the computer security problems of virus elimination and ID
Keywords :
multi-agent systems; security of data; self-adjusting systems; software agents; software architecture; Internet communication; Java implementation; abnormalities; anomalous pattern detection; anti-virus software; artificial immune system architecture; biological strategies; computer program monitoring; computer security applications; computer virus attacks; electronic commerce; global interconnectivity; hierarchical layered architecture; known signatures; network intrusion detection; network services; network usage monitoring; prototype interactive system; self-adaptive distributed agent-based defense immune system; system protection; Artificial immune systems; Biology computing; Computer architecture; Computer networks; Computer security; Computerized monitoring; IP networks; Intrusion detection; Protection; Web and internet services;
Journal_Title :
Evolutionary Computation, IEEE Transactions on
DOI :
10.1109/TEVC.2002.1011540