computer immune system
Recently Published Documents


TOTAL DOCUMENTS

12
(FIVE YEARS 0)

H-INDEX

4
(FIVE YEARS 0)

2013 ◽  
Vol 824 ◽  
pp. 200-205 ◽  
Author(s):  
Susan Konyeha ◽  
Emmanuel A. Onibere

Computers are involved in every aspect of modern society and have become an essential part of our lives, but their vulnerability is of increasing concern to us. Security flaws are inherent in the operation of computers Most flaws are caused by errors in the process of software engineering or unforeseen mishaps and it is difficult to solve these problems by conventional methods. A radical way of constantly monitoring the system for newly disclosed vulnerabilities is required. In order to devise such a system, this work draws an analogy between computer immune systems and the human immune system. The computer immune system is the equivalent of the human immune system. The primary objective of this paper is to use an intrusion detection system in the design and implementation of a computer immune system that would be built on the framework of the human immune system. This objective is successfully realized and in addition a prevention mechanism using the windows IP Firewall feature has been incorporated. Hence the system is able to perform intrusion detection and prevention. Data was collected about events occurring in a computer network that violate predefined security policy, such as attempts to affect the confidentiality, integrity or its availability using Snort rules for known attacks and adaptive detection for the unknown attacks. The system was tested using real-time data and Intrusion Detection evaluation (IDEVAL) Department of Defense Advanced Research Projects Agency (DARPA) data set. The results were quite encouraging as few false positive were recorded.


2013 ◽  
Vol 432 ◽  
pp. 549-554
Author(s):  
Mei Mei Wu

In this paper we introduce a kind of management mechanism for computer immune system GECISM (GEneral Computer Immune System Model)[. With it when emergency happens it can be timely and actively response according to the current state of database. Thus it improved the executive efficiency of the computer immune system. The method is that we design the local rules in the form of active database. It neednt user intervention for the processes to be handled by the processor. The database of the client machine can automatically carry out the judgment of "self" and "non-self". So it can improve the system's processing capability.


Author(s):  
Paul D. Williams ◽  
Kevin P. Anchor ◽  
John L. Bebo ◽  
Gregg H. Gunsch ◽  
Gary D. Lamont

Author(s):  
Jeffrey Kephart ◽  
Gregory Sorkin ◽  
Morton Swimmer ◽  
Steve White

Sign in / Sign up

Export Citation Format

Share Document