A NetFlow based flow analysis and monitoring system in enterprise networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Formal model for agent-based asynchronous evolutionary computation
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
A peer-to-peer blacklisting strategy inspired by leukocyte-endothelium interaction
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Hi-index | 0.00 |
In this paper, we design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.