Design of security system based on immune system

The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language,...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001 s. 138 - 143
Hlavní autoři: Nishiyama, H., Mizoguchi, F.
Médium: Konferenční příspěvek
Jazyk:angličtina
japonština
Vydáno: IEEE 01.01.2001
Témata:
ISBN:9780769512693, 0769512690
ISSN:1080-1383
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.
AbstractList The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.
Author Nishiyama, H.
Mizoguchi, F.
Author_xml – sequence: 1
  givenname: H.
  surname: Nishiyama
  fullname: Nishiyama, H.
  organization: Fac. of Sci., Science Univ. of Tokyo, Chiba, Japan
– sequence: 2
  givenname: F.
  surname: Mizoguchi
  fullname: Mizoguchi, F.
BookMark eNotj8tOwzAURC1RJNrSD4CVfyDh2tex42Up5SFFsIF15djXyIgkKE4X-XsqtauRRkdzNCu26IeeGLsTUAoB9mH_vn1sSgkgSluhArxiG2tqMNpWQmqLC7YUUEMhsMYbtsr5B-CEK7tk8EQ5ffd8iDyTP45pmnme80Qdb12mwIeep6479nSpb9l1dL-ZNpdcs6_n_efutWg-Xt5226ZIJ-NUBBe9CboymkCAkAJD7YWzWkaFCts2ktexkgY0SgkmSBUgkLbRqUo5j2t2f95NRHT4G1Pnxvlw_of_GwhFDw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ENABL.2001.953403
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 143
ExternalDocumentID 953403
GroupedDBID 23M
29P
6IE
6IL
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i269t-dafc7d6576e0101213d8c1a962f4343bbfec6f5270632207d24d0de69fa454ac3
IEDL.DBID RIE
ISBN 9780769512693
0769512690
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000172786100026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1080-1383
IngestDate Tue Aug 26 17:27:25 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
Japanese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i269t-dafc7d6576e0101213d8c1a962f4343bbfec6f5270632207d24d0de69fa454ac3
PageCount 6
ParticipantIDs ieee_primary_953403
PublicationCentury 2000
PublicationDate 2001-01-01
PublicationDateYYYYMMDD 2001-01-01
PublicationDate_xml – month: 01
  year: 2001
  text: 2001-01-01
  day: 01
PublicationDecade 2000
PublicationTitle Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001
PublicationTitleAbbrev ENABL
PublicationYear 2001
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020049
ssj0000454929
Score 1.4926065
Snippet The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or...
SourceID ieee
SourceType Publisher
StartPage 138
SubjectTerms Communication system security
Computer networks
Computer security
Immune system
Information analysis
Information security
Intrusion detection
IP networks
Logic programming
Protection
Title Design of security system based on immune system
URI https://ieeexplore.ieee.org/document/953403
WOSCitedRecordID wos000172786100026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagYoAFKEW85YE1rWM7djLyaMVQVR0AdascP6QuCeqD31-fbQpILEgZHC_22cPdd_7uO4TuHSmNEibPFKtJxgtSZzX3mAfoOaSSjsd8x_tYTiblbFZNk852qIWx1gbyme3DMLzlm1ZvIFU2qArGQdlzX0oRS7V26RRQkguePmGtFPkCgw5k9lhE7D6coB4OJuGdr3-WXjtzUg2Gk4fHMcDGvB9X-9V1JTid0fG_tnuCet_Fe3i6c0unaM82XXT0Q3fwDJHnwNvArcOr1L8OR0lnDF7N4LbBCygcsWm6h95Gw9enlyy1TsgW3qB1ZpTT0ggPJiyIyNGcmVLnqhLUQSlpXTurhSuo9BEKpUQayg0xVlRO-YNUmp2jTtM29gJh6vdrCfcn6TS3TqmSiDrnzuM2JgvjLlEXTJ9_RHWMebT66s_Za3QYOVzw3aDOermxt-hAf64Xq-VduNEta1iY5g
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZQQQIWoBTxxgNrWsd2XiOPVkWEqENB3SontqUuCWpTfj8-2xSQWJAyOF7ss4e77_zddwjdapJKEcswEKwkAY9IGZTcYB6g55As0dzlO97ypCjS2SybeJ1tWwujlLLkM9WHoX3Ll021hlTZIIsYB2XP7YhzSlyx1iahAlpy1td7tOVjX-DQgdAec5jdBBTUAEIvvfP1z_x7Z0iywbC4u88BOIZ9t96vvivW7YwO_rXhQ9T7Lt_Dk41jOkJbqu6i_R_Kg8eIPFrmBm40XvkOdtiJOmPwaxI3NV5A6Yjy0z30OhpOH8aBb54QLIxBbSCFrhIZGzihQEaOhkymVSiymGooJi1LrapYRzQxMQqlJJGUSyJVnGlhDlJU7AR16qZWpwhTs19FuDlJXXGlhUhJXIZcG-TGkkjqM9QF0-fvTh9j7qw-_3P2Bu2Opy_5PH8qni_QnmN0wXeJOu1yra7QTvXRLlbLa3u7n5jenC0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+Tenth+IEEE+International+Workshop+on+Enabling+Technologies%3A+Infrastructure+for+Collaborative+Enterprises.+WET+ICE+2001&rft.atitle=Design+of+security+system+based+on+immune+system&rft.au=Nishiyama%2C+H.&rft.au=Mizoguchi%2C+F.&rft.date=2001-01-01&rft.pub=IEEE&rft.isbn=9780769512693&rft.issn=1080-1383&rft.spage=138&rft.epage=143&rft_id=info:doi/10.1109%2FENABL.2001.953403&rft.externalDocID=953403
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1080-1383&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1080-1383&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1080-1383&client=summon