Computer viruses: theory and experiments
Computers and Security
The application of epidemiology to computer viruses
Computers and Security
An introduction to Kolmogorov complexity and its applications
An introduction to Kolmogorov complexity and its applications
Learning using an artificial immune system
Journal of Network and Computer Applications - Special issue on intelligent systems: design and applications. Part 2
Active Networks and Active Network Management: A Proactive Management Framework
Active Networks and Active Network Management: A Proactive Management Framework
Properties of the Bucket Brigade
Proceedings of the 1st International Conference on Genetic Algorithms
An Immunochip Architecture and Its Emulation
EH '02 Proceedings of the 2002 NASA/DoD Conference on Evolvable Hardware (EH'02)
DANCE '02 Proceedings of the 2002 DARPA Active Networks Conference and Exposition
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Biologically inspired defenses against computer viruses
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Analyzing worms and network traffic using compression
Journal of Computer Security
A Study of Malcode-Bearing Documents
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION
Cybernetics and Systems
Decentralized detector generation in cooperative intrusion detection systems
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Toward an abstract computer virology
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
Hi-index | 0.00 |
This article presents results in two mutually complementary areas: distributed immunological information assurance and a new signature-matching technique based on Kolmogorov Complexity. This article introduces a distributed model for security based on biological paradigms of epidemiology and immunology. In this model each node in the network has an immune system that identifies and destroys pathogens in the incoming network traffic as well as files resident on the node. The network nodes present a collective defense to the pathogens by working symbiotically and sharing pathogen information with each other. Each node compiles a list of pathogens that are perceived as threats by using information provided from all the nodes in the network. The signatures for these pathogens are incorporated into the detector population of the immune systems to increase the probability of detection. Critical to the success of this system is the detection scheme, which should not only be accurate but also efficient. Three separate schemes for detecting pathogens are examined, namely, contiguous string matching, Hamming distance, and Kolmogorov Complexity. This work provides a model of the system and examines the efficiency of different detection schemes. A simulation model is built to study the sensitivity of model parameters, such as signature length, sampling rate, and network topology, to detection of pathogens.