[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11536444_13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Cooperative automated worm response and detection immune ALgorithm(CARDINAL) inspired by t-cell immunity and tolerance

Published: 14 August 2005 Publication History

Abstract

The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such an algorithm fits into a complete immune inspired computer security system and framework.

References

[1]
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between ais and ids. In Proceedings of the International Conference on Artificial Immune Systems (ICARIS'03), pages 156-167, Edinburgh, UK, 2003.
[2]
U. Aickelin, J. Greensmith, and J. Twycross. Immune system approaches to intrusion detection - a review. In Proceedings of ICARIS'04, pages 316-329, Catania, Italy, September 2004.
[3]
K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, A. D. Keromytis, and D. Li. A cooperative immunization system for an untrusting internet. In Proceedings of the 11th International Conference on Networks (ICON), 2003, Sydney, October 2003.
[4]
P. J. Bentley, J. Greensmith, and S. Ujjin. Two ways to grow tissue for artificial immune systems. In Proceedings of ICARIS'05, 2005.
[5]
R. Coico, Sunshine G., and E. Benjamini. Immunology: A Short Course. John Wiley & Son, fifth edition, 2003.
[6]
J. Greensmith, U. Aickelin, and S. Cayzer. Introducing dendritic cells: A novel immune-inspired algorithm for anomaly detection. In Proceedings of ICARIS'05, 2005.
[7]
C. A. Janeway, P. Travers, M. Walport, and M. J. Shlomchik. Immunobiology: the immune system in health and disease. Garland Science Publishing, sixth edition, 2005.
[8]
J. Kim. Integrating Artificial Immune Algorithms for Intrusion Detection. PhD thesis, Department of Computer Science, University College London, 2002.
[9]
P. Matzinger. An innate sense of danger. Seminars in Immunology, 10:399-415, 1998.
[10]
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33-39, August 2003.
[11]
D. Moore and C. Shannon. Code-red: a case study on the spread and victims of an internet worm. In Proceedings of the 2002 ACM SIGCOMM Internet Measurement Workshop, pages 273-284, Marseille, France, November 2002.
[12]
J. Nazario. www.wormblog.com, 2005.
[13]
D. Nojiri, J. Rowe, and K. Levitt. Cooperative response strategies for large scale attack mitigation. In DARPA Information Survivability Conference and Exposition, pages 293-302, 2003.
[14]
P. Porras, L. Briesemeister, K. Skinner, K. Levitt, J. Rowe, and Y. A. Ting. A hybrid quarantine defense. In Proceedings of the 2004 ACM workshop on Rapid malcode (WORM'04), pages 73-82, Washington DC, USA, October 2004.
[15]
J. Twycross. Soma - a self-orgnasing mobile agent immune system for computer networks. Unpublished working report, September 2004.
[16]
N. Weaver, S. Staniford, and V. Paxson. Very fast containment of scanning worms. In Proceedings of the 13th Usenix Security Conference, 2004.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICARIS'05: Proceedings of the 4th international conference on Artificial Immune Systems
August 2005
499 pages
ISBN:3540281754
  • Editors:
  • Christian Jacob,
  • Marcin L. Pilat,
  • Peter J. Bentley,
  • Jonathan I. Timmis

Sponsors

  • Alberta Informatics Circle of Research Excellence (iCORE)
  • PIMS: The Pacific Institute for the Mathematical Sciences
  • ARTIST
  • UOC: University of Calgary
  • MITACS

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 14 August 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2009)Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion DetectionProceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications10.1007/978-3-642-01665-3_2(11-19)Online publication date: 30-May-2009
  • (2008)Application areas of AISApplied Soft Computing10.1016/j.asoc.2006.12.0048:1(191-201)Online publication date: 1-Jan-2008
  • (2006)Articulation and clarification of the dendritic cell algorithmProceedings of the 5th international conference on Artificial Immune Systems10.1007/11823940_31(404-417)Online publication date: 4-Sep-2006
  • (2006)Danger is ubiquitousProceedings of the 5th international conference on Artificial Immune Systems10.1007/11823940_30(390-403)Online publication date: 4-Sep-2006

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media