Skip to main content

Information Security with Formal Immune Networks

  • Conference paper
  • First Online:
Information Assurance in Computer Networks (MMM-ACNS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2052))

Abstract

We propose a biological approach to information security based on a rigorous mathematical notion of formal immune network. According to our previous developments, such networks possess all the main capabilities of artificial intelligence system, and could be considered as an alternative to the wide spread artificial neural networks or intelligent agents. We consider also the main distinctions of our approach from the modern information security by agent-based modeling and artificial immune systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agnati, L.F.: Human brain in science and culture (in Italian). Casa Editrice Ambrociana, Milano (1998)

    Google Scholar 

  2. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems J. Vol. 35.3–4 (1996) 313–336

    Article  Google Scholar 

  3. Coutinho, A.: Immunology: the heritage of the past. Letters of the L.Pasteur Institute of Paris (in French). 8 (1994) 26–29

    Google Scholar 

  4. Dasgupta, D. (ed.): Artificial immune systems and their applications. Springer-Verlag, Berlin Heidelberg New York (1999)

    Google Scholar 

  5. Dasgupta, D.: Immunity based intrusion detection system: a general framework. In: Proc. of the 22th National Information Security Conference. Arlington, Virginia, USA (1999)

    Google Scholar 

  6. DeBoer, R.J., Segel, L.A., Perelson, A.S.: Pattern formation in one and two-dimensional shape space models of the immune system. J. Theoret. Biol. 155 (1992) 295–333

    Article  Google Scholar 

  7. Forrest, S., Hofmeyer, S., Somayaji, A.: Computer immunology. Communication of the ACM, Vol. 40.10 (1997) 88–96

    Article  Google Scholar 

  8. Gorodetsky, V.I., Kotenko, I.V., Popyack, L.J., Skormin, V.A.: Agent based model of information security system: architecture and framework for behavoir coordination. In: Proc. of the 1st Int. Workshop of Central and Eastern Europe on Multi-Agent Systems (CEEMAS’99). St.Petersburg, Russia (1999) 323–331

    Google Scholar 

  9. Hofmeyr, S., Forrest, S.: Immunity by design: an artificial immune system. In: Proc. of the Genetic and Evolutionary Computation Conference (GECCO-99). (1999) 1289–1296

    Google Scholar 

  10. Kuznetsov, V.I., Milyaev, V.B., Tarakanov, A.O.: Mathematical basis of complex ecological evaluation. St. Petersburg University Press (1999)

    Google Scholar 

  11. Scormin, V.A., Delgado-Frias, J.G.: Biological Approach to System Information Security (BASIS), A White Paper. Air Force Research Lab., Rome, NY (2000)

    Google Scholar 

  12. Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a computer immune system. In: New Security Paradigms Workshop, ACM (1998) 75–82

    Google Scholar 

  13. Tannenbaum, A.S.: Computer networks. 3rd edn. Prentice Hall (1996)

    Google Scholar 

  14. Tarakanov, A.O.: Mathematical models of biomolecular information processing: formal peptide instead of formal neuron (in Russian). In: Problems of Informatization J. 1 (1998) 46–51

    Google Scholar 

  15. Tarakanov, A.: Formal peptide as a basic agent of immune networks: from natural prototype to mathematical theory and applications. In: Proc. of the 1st Int. Workshop of Central and Eastern Europe on Multi-Agent Systems (CEEMAS’99). St. Petersburg, Russia (1999) 281–292

    Google Scholar 

  16. Tarakanov, A., Adamatzky, A.: Virtual clothing in hybrid cellular automata. (2000) http://www.ias.uwe.ac.uk/~a-adamat/clothing/cloth_06.htm

  17. Tarakanov, A., Dasgupta, D.: A formal model of an artificial immune system. In: BioSystems J. Vol. 55,1–3 (2000) 151–158

    Article  MATH  Google Scholar 

  18. Tarakanov, A., Sokolova, S., Abramov, B., Aikimbayev, A.: Immunocomputing of the natural plague foci. In: Proc. of Int. Genetic and Evolutionary Computation Conference (GECCO-2000), Workshop on Artificial Immune Systems. Las Vegas, USA (2000) 38–39

    Google Scholar 

  19. Wasserman, P.: Neural computing. Theory and practice. Van Nostrand Reihold, New York (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tarakanov, A.O. (2001). Information Security with Formal Immune Networks. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-45116-1_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42103-0

  • Online ISBN: 978-3-540-45116-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics