KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Multiagent-based dendritic cell algorithm with applications in computer security
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Hi-index | 0.00 |
Inspired by the potential interesting ideas of the danger theory (DT), the research into artificial immune system (AIS) has been developing faster then everThe basic role of DT embedded in AIS is to provide what T-cells should respond through the professional antigen-presenting cells when there are some cells undergoing injury, or stress or `bad cell death'However, in the context of AIS-based network security systems, how to minimize damage by mitigating virus infection is a key step to solve real-world problems. In this paper we present the blueprint of a DT inspired multi-agents AIS for anomaly detection, it is called MAAIS, which can dynamically adapt to various types of immune responses by configuring parameters during the course of evaluating the degree of danger signals receivedAdditionally, a suitable mechanism of communication between agents is employed to stipulate the better performance of the novel system