Article

Article title BACKGROUND OF THE MODELS IN COMPUTER SECURITY PRINCIPLES OF THE IMMUNE SYSTEM
Authors Yu.A. Bryukhomitsky
Section SECTION 6. INFORMATION SAFETY
Month, Year 01, 2012 @en
Index UDC 681.324
DOI
Abstract Analyzes the prerequisites, conditions and restrictions when creating adaptive models of computer security, leading to the problem of finding the differences, "a" from "foreign". It is proposed to expand applied for this purpose a model based on negative selection algorithm, by introducing into it the properties of the double – the parametric and structural plasticity. The main principles of parametric and structural adaptation in models of computer security. The result is a simulation of an adaptive self-organizing structure, focused on maintaining an effective level of Computer security violations are detected by arbitrarily changing inputs.

Download PDF

Keywords Protected computer systems; adaptive models of computer security; the immune system; negative selection algorithm; double plasticity; immune response.
References 1. Искусственные иммунные системы и их применение / Под ред. Д. Дасгупты; Пер. с англ. под ред. А.А. Романюхи. – М.: Физматлит, 2006. – 344 с.
2. Kuby J. Immunology. W.H. Freeman and Co., 2nd edition, 1994.
3. Forrest S., Perelson A.S., Allen L., Cherukuri R. Self-nonself discrimination in a computer // In: Proc. of IEEE symposium on research in security, Oakland, CA, 16-18 May, 1994. – P. 202-212.
4. Dasgupta D., Forrest S. Tool breakage detection in milling operations using a negativeselection algorithm // Technical report CS95-5, Department of computer science, University of New Mexico, 1995.
5. Percus J.K., Percus O., Perelson A.S. Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination // PNAS. – 1993. – Vol. 60. – P. 1691-1695.
6. Dhaeseleer P., Forrest S., Helman P. An immunological approach to change detection: algorithms, analysis, and implications // In: Proc. of Ieee symposium on research in security, Oakland, CA, May, 1996.
7. Forrest S., Hofmeyr S.A. Somayaji A., Longstaff T.A. A sense of self for unix processes // In: Proc. Of IEEE symposium on research in security and privacy, Oakland, CA, May, 1996.
8. Bersini H., Varela F. The immune learning mechanisms: Recruitment reinforcement and their applications // Computing with biological metaphors (Ed/ R/ Patton). – L.: Chapman and Hall, 1994.
9. Jerne N.K. Towards a network theory of the immune system // Ann. Immunol. (Inst/ Pasteur). – 1974. – Vol. 125. – P. 435-441.

Comments are closed.