Study of Computer Security Based on Biological Immune
Abstract
In this paper, the multi-agent computer virus immune system based on immunity and multi-agent intrusion detection system based on immunity are established thorough combination of biological immune system and multi-agent technology. The multilayer defense structure is applied to the computer virus immune system to realize high distributives, adaptively and robustness relying on the independent agents with different functions. As for the intrusion detection system, the acquired knowledge is automatically systemized in the way of gene combination to cope with some unknown attack modes, moreover, the system is able to collect data in the different layers and analyze the essential relationship, so that it can detect not only the host-based attack, but also the network-based attack.
Full Text:
PDFReferences
Arrena S., Garen S. (2002). Silent warfare: understanding the world of intelligence,Potomac Books Incorporated, 42(2), 203-206.
Bean D. (1997). Sensor fusion potential exploitation-innovative architectures and illustrative applications, Proceedings of the IEEE,85(1), 24-38.
Blasch E., Plano S. (2005). DFIG Level 5 (User Refinement) issues supporting Situational Assessment Reasoning, In Proceedings of the 8th International Conference on Information Fusion.
Cera M. (2007). Network security assessment,O’Reilly Media,8(12), 236-241.
Dean H., Jure L. (1997). An introduction to multisensor data fusion,Proceedings of the IEEE,85(1),6-23.
Eeare A. (1993). Fighter cockpits of the future,In Proceeding of the 12th Digital Avionics Systems Conference, 25(28), 318-323.
Eellen B., Serena P. (2002). User refinement issues and applications in group tracking,Proceedings of SPIE,4729(7), 270-279.
Ellence S., Done B. (2001). The extended OODA model for data fusion systems,In Proceedings of the 4th International Conference on Information Fusion, 12(3), 19-25.
Irrenger K. (2005). Knowledge representation issues in perceptual reasoning managed situation assessment,In Proceedings of the 8th International Conference on Information Fusion.
Jian C.F., Zhang W., Ying Y. (2015). A micro-gesture recognition on the mobile web client,Review of Computer Engineering Studies, 2(2),19-24.
Jone S. (2002). Information fusion: a high-level architecture overview,In Proceedings of the 5th International Conference on Information Fusion.
Jure B. (1996). The essence of winning and losing,Unpublished lecture notes.
Kid F., Sure L. (2004). Study on information security management system evaluation-assets,threat and vulnerability,Computer Standards & Interfaces,26(6), 501-513.
Jin R., Kou C.H., Liu R. (2014). Biclustering algorithm of differential co-expression for gene data,Review of computer engineering studies, 1(1), 7-12.
Jin R., Hong L., Wang C., Wu L., Si W. (2015). A Hierarchical clustering community algorithm which missed the signal in the process of transmission,Review Of Computer Engineering Studies, 2(3),27-34.
Makalar L. (2003). The National Strategy to Secure Cyberspace,Educause Review,38(1),60-69.
Mark M. (2007). Technology foresight on data fusion and data processing,Journal of The Royal Aeronautical Society, 12(3),36-39.
Nicklaus A.G. (2010). Application of the JDL data fusion process model for cyber security,Proc. SPIE 7710, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications, 7710, 231-235.
Porras P. (2009). Inside risks Reflections on Conficker,Communications of the ACM,52(10), 23-24.
Quintar M., Puiggali J.R. (1986). Numerical modelling of transport processes during the drying of a granular porous medium,International Journal of Heat & Technology, 4(2),37-57.
Shaogang F., Shao Z. (2001). Critical Infrastructure Protection in the Information Age,Executive Order,13, 23, 114-119.
Taker B. (1999). Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems,Proceedings of the Iris National Symposium on Sensor & Data Fusion,24-27.
Tu J.H., Quan Z. (2014). Design and implementation of the crying voice detection circuit in the baby’s supervision system,Review of Computer Engineering Studies,1(1), 13-16.
Ya W., Qin S. (2015). Aircraft fault diagnosis by solving map exactly, Review of Computer Engineering Studies, 2(1), 1-8.
Zhao Y., Feng C., Yang J., Wang L. (2015). Literature Review of Network Public Opinion About the E-commerce, Review of Computer Engineering Studies,2(2), 25-30.
Refbacks
- There are currently no refbacks.

Revista de la Facultad de Ingeniería,
ISSN: 2443-4477; ISSN-L:0798-4065
Edif. del Decanato de la Facultad de Ingeniería,
3º piso, Ciudad Universitaria,
Apartado 50.361, Caracas 1050-A,
Venezuela.
© Universidad Central de Venezuela