The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is vital to computer networks. IDSs (intrusion detection systems) are one of the important building blocks of a secure, reliable network and are used widely along with the other security programs and concepts. As the time passes, their importance becomes clearer. Recently, there have been some interesting researches on biological immune systems as a model for intrusion detection. In this...
Based on the modulation mechanism of neuroendocrine-immune system, we present a novel bio-distributed network control system (BDNCS). The BDNCS includes four levels. Level 1 is corresponding to immune system, and composed of some embedded transmitter-controller unit (ETCU), which is designed based on the ultra-short loop feedback mechanism of NEI. Level 2 is corresponding to endocrine system, and...
An artificial immune system (ARTIS) enlightened by the biological immune system is emerging as a new field of computation intelligence research. At present, it showed us many properties after the research to the immune system, including distributed computation, self-organization and lightweight, which were discovered to meet the requests of ARTIS. So the Immunology applied to the intrusion detection...
Recently network intrusion detection is one of the hottest research topics. Existing network-based Intrusion Detection System (IDS) has drawbacks in many aspects, among of which the two outstanding problems are the high ratio of false alarms and the lack of self-adaptation. The powerful information processing capabilities of the biological immune system, such as feature extraction, pattern recognition,...
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security system can't satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired network security theory to be a hot research area currently. Based on BMNSM (bio-inspired multidimensional network security model) we have put forward,...
An immune method for real-time computer network security risk evaluation is proposed. The concepts of self, nonself, antigen and immunocyte of computer immune system are defined. The dynamic model of self, marrow model, clone selection, learning scheme, life span of immunocyte are built. A computational model of risk evaluation based on the antibody concentration of memory immunocytes for network...
The principle and development of bio-inspired computer immune system are surveyed. A computer network immune system model intending to remove the three hidden perils of computer security (intrusion, virus, abnormity) - LAN immune system model based on host (LISMH) is presented. The workflow of virus detection and removal in LISMH are emphasized and its strongpoint comparing to other computer immune...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.