A computer security model of imitated nature immune and its FSM

  • Authors:
  • Zhenpeng Liu;Ailan Li;Dongfang Wang;Wansheng Tang

  • Affiliations:
  • Network Center, Hebei University, Baoding, China and Institute of System Engineering, Tianjin University, Tianjin, China;Department of Foundation Teaching, Hebei Jiaotong Vocational & Technical College, Shijiazhuang, China;Network Center, Hebei University, Baoding, China;Institute of System Engineering, Tianjin University, Tianjin, China

  • Venue:
  • LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

According to the nature immunology, This paper describe a computer security model imitated the principle of nature immunity, GECISM (GEneral Computer Immune System Model). The model is structured by agents. The agent imitates the immune cells. Through rules and co-operation the agent discriminate "self" and "non-self". Further it eliminates "non-self". The FSM model of GECISM accurately describes this system and meanwhile is the basement of performance analysis and system test about GECISM.