Skip to main content

A New Bio-inspired Model for Network Security and Its Application

  • Conference paper
Advanced Web and Network Technologies, and Applications (APWeb 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3842))

Included in the following conference series:

  • 762 Accesses

Abstract

Bio-inspired approach for network security is appealing because of the obvious analogies between the security of network systems and the survival of biological species. However, nearly all the existing researches only focus on some facets of network security using partial security mechanisms of biosystem. In this paper, a comprehensive bio-inspired model for network security is proposed to fully exhibit the performances by which the biology achieves security. The analysis shows that the model can not only provide a framework for researchers but also offer some new research angles for pursuers in the field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Forrest, S., Perelson, A.S.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, 5 (1994)

    Google Scholar 

  2. Forrest, S., Somayaji, A., Ackley, D.H.: Building Diverse Computer Systems. In: Workshop on Hot Topics in Operating Systems, pp. 67–72 (1997)

    Google Scholar 

  3. Kephart, J.O., White, S.R.: Directed Graph Epidemiological models of Computer Viruses. In: Proceedings of the 1991 IEEE Computer Security Symposium on Research in Security and Privacy, Oakland California, vol. 5, pp. 343–359 (1991)

    Google Scholar 

  4. Somayaji, A., Forrest, S.: Automated Response using System-call Delays. In: Proceedings of the 9th USENIX Security Symposium, pp. 185–197 (2000)

    Google Scholar 

  5. Dasgupta, D.: An Immune-based Technique to Characterize Intrusions in Computer Networks. IEEE Transactions on Evolutionary Computation, 6 (2002)

    Google Scholar 

  6. Williamson, M.M., Léveillé, J.: An Epidemiological Model of Virus Spread and Cleanup. Hewlett-Packard, 12 (2003)

    Google Scholar 

  7. Bradley, D., Tyrrell, A.: Embryonics+Immunotronics: A Bio-inspired Approach to Fault Tolerance, http://www.amp.york.ac.uk/external/media

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, Hq., Wang, J., Zhao, Gs. (2006). A New Bio-inspired Model for Network Security and Its Application. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_102

Download citation

  • DOI: https://doi.org/10.1007/11610496_102

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31158-4

  • Online ISBN: 978-3-540-32435-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics