Design of security system based on immune system

The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language,...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001 pp. 138 - 143
Main Authors: Nishiyama, H., Mizoguchi, F.
Format: Conference Proceeding
Language:English
Japanese
Published: IEEE 01.01.2001
Subjects:
ISBN:9780769512693, 0769512690
ISSN:1080-1383
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.
AbstractList The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.
Author Nishiyama, H.
Mizoguchi, F.
Author_xml – sequence: 1
  givenname: H.
  surname: Nishiyama
  fullname: Nishiyama, H.
  organization: Fac. of Sci., Science Univ. of Tokyo, Chiba, Japan
– sequence: 2
  givenname: F.
  surname: Mizoguchi
  fullname: Mizoguchi, F.
BookMark eNotj8tOwzAURC1RJNrSD4CVfyDh2tex42Up5SFFsIF15djXyIgkKE4X-XsqtauRRkdzNCu26IeeGLsTUAoB9mH_vn1sSgkgSluhArxiG2tqMNpWQmqLC7YUUEMhsMYbtsr5B-CEK7tk8EQ5ffd8iDyTP45pmnme80Qdb12mwIeep6479nSpb9l1dL-ZNpdcs6_n_efutWg-Xt5226ZIJ-NUBBe9CboymkCAkAJD7YWzWkaFCts2ktexkgY0SgkmSBUgkLbRqUo5j2t2f95NRHT4G1Pnxvlw_of_GwhFDw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ENABL.2001.953403
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 143
ExternalDocumentID 953403
GroupedDBID 23M
29P
6IE
6IL
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i269t-dafc7d6576e0101213d8c1a962f4343bbfec6f5270632207d24d0de69fa454ac3
IEDL.DBID RIE
ISBN 9780769512693
0769512690
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000172786100026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1080-1383
IngestDate Tue Aug 26 17:27:25 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
Japanese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i269t-dafc7d6576e0101213d8c1a962f4343bbfec6f5270632207d24d0de69fa454ac3
PageCount 6
ParticipantIDs ieee_primary_953403
PublicationCentury 2000
PublicationDate 2001-01-01
PublicationDateYYYYMMDD 2001-01-01
PublicationDate_xml – month: 01
  year: 2001
  text: 2001-01-01
  day: 01
PublicationDecade 2000
PublicationTitle Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001
PublicationTitleAbbrev ENABL
PublicationYear 2001
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020049
ssj0000454929
Score 1.4926065
Snippet The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or...
SourceID ieee
SourceType Publisher
StartPage 138
SubjectTerms Communication system security
Computer networks
Computer security
Immune system
Information analysis
Information security
Intrusion detection
IP networks
Logic programming
Protection
Title Design of security system based on immune system
URI https://ieeexplore.ieee.org/document/953403
WOSCitedRecordID wos000172786100026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELUAMcAClCK-5YE1bWzXdjLy0YqhqjoA6lYl9lnqkqB-8Pvx2aaAxIKUIfGSnC3lvbPvvSPkrpbgSQFAJoGpbCANy4q6qLHKwkkttGHBZ_ttrCeTYjYrp8lnO2hhACAUn0EPb8NZvm3NBrfK-qUUA3T23NVaRanWdjsFneQC0qdcKzFfrKBDmz0RM3ZPJ7hPB5PxztezSKedLC_7w8n9wxjTRtaLb_vVdSWAzujoX597TLrf4j063cLSCdmBpkMOf_gOnpL8KdRt0NbRVepfR6OlM0VUs7Rt6AKFI5CGu-R1NHx5fM5S64Rs4QNaZ7ZyRls_4QrQRI4zYQvDqlJxh1LSunZglJNce4bCea4tH9jcgipd5SeyMuKM7DVtA-eE6koZ7f9FnhtWHslY6QwDroxHdmmEFBekg6HP36M7xjxGffnn6BU5iDVceF2TvfVyAzdk33ysF6vlbVjRT5GsmA8
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVQQQIWoBTxjQfWtLEdx8nIR6siQtShoG5VYp-lLglqU34_tmMKSCxIGRIvydlS3jv73juEbksOhhQABBxIHERckiApk9JWWWgumJDE-Wy_ZSLPk9ksnXifbaeFAQBXfAZ9e-vO8lUt13arbJByFllnz20eRTRsxVqbDRXrJeew3mdbnvvaGjprtMfanN0QCmoSQm-98_XM_HknCdPBML-7z2ziSPrt-371XXGwMzr41wcfot63fA9PNsB0hLag6qL9H86Dxyh8dJUbuNZ45TvY4dbUGVtcU7iu8MJKR8AP99DraDh9GAe-eUKwMAE1gSq0FMpMeQzWRo4SphJJijSm2opJy1KDjDWnwnAUSkOhaKRCBXGqCzORhWQnqFPVFZwiLIpYCvM3MuywMFhGUi0J0FgabOeScXaGujb0-XvrjzFvoz7_c_QG7Y6nL9k8e8qfL9BeW9Flr0vUaZZruEI78qNZrJbXbnU_AbWqm1Y
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+Tenth+IEEE+International+Workshop+on+Enabling+Technologies%3A+Infrastructure+for+Collaborative+Enterprises.+WET+ICE+2001&rft.atitle=Design+of+security+system+based+on+immune+system&rft.au=Nishiyama%2C+H.&rft.au=Mizoguchi%2C+F.&rft.date=2001-01-01&rft.pub=IEEE&rft.isbn=9780769512693&rft.issn=1080-1383&rft.spage=138&rft.epage=143&rft_id=info:doi/10.1109%2FENABL.2001.953403&rft.externalDocID=953403
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1080-1383&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1080-1383&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1080-1383&client=summon