Design of security system based on immune system
The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language,...
Gespeichert in:
| Veröffentlicht in: | Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001 S. 138 - 143 |
|---|---|
| Hauptverfasser: | , |
| Format: | Tagungsbericht |
| Sprache: | Englisch Japanisch |
| Veröffentlicht: |
IEEE
01.01.2001
|
| Schlagworte: | |
| ISBN: | 9780769512693, 0769512690 |
| ISSN: | 1080-1383 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other. |
|---|---|
| AbstractList | The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or non-self, but also cooperation among immune cells of the system. This system defines an immune cell as one agent based on our multiagent language, which is an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other. |
| Author | Nishiyama, H. Mizoguchi, F. |
| Author_xml | – sequence: 1 givenname: H. surname: Nishiyama fullname: Nishiyama, H. organization: Fac. of Sci., Science Univ. of Tokyo, Chiba, Japan – sequence: 2 givenname: F. surname: Mizoguchi fullname: Mizoguchi, F. |
| BookMark | eNotj8tOwzAURC1RJNrSD4CVfyDh2tex42Up5SFFsIF15djXyIgkKE4X-XsqtauRRkdzNCu26IeeGLsTUAoB9mH_vn1sSgkgSluhArxiG2tqMNpWQmqLC7YUUEMhsMYbtsr5B-CEK7tk8EQ5ffd8iDyTP45pmnme80Qdb12mwIeep6479nSpb9l1dL-ZNpdcs6_n_efutWg-Xt5226ZIJ-NUBBe9CboymkCAkAJD7YWzWkaFCts2ktexkgY0SgkmSBUgkLbRqUo5j2t2f95NRHT4G1Pnxvlw_of_GwhFDw |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ENABL.2001.953403 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 143 |
| ExternalDocumentID | 953403 |
| GroupedDBID | 23M 29P 6IE 6IL ACGFS ALMA_UNASSIGNED_HOLDINGS CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i269t-dafc7d6576e0101213d8c1a962f4343bbfec6f5270632207d24d0de69fa454ac3 |
| IEDL.DBID | RIE |
| ISBN | 9780769512693 0769512690 |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000172786100026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1080-1383 |
| IngestDate | Tue Aug 26 17:27:25 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English Japanese |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i269t-dafc7d6576e0101213d8c1a962f4343bbfec6f5270632207d24d0de69fa454ac3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_953403 |
| PublicationCentury | 2000 |
| PublicationDate | 2001-01-01 |
| PublicationDateYYYYMMDD | 2001-01-01 |
| PublicationDate_xml | – month: 01 year: 2001 text: 2001-01-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationTitle | Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001 |
| PublicationTitleAbbrev | ENABL |
| PublicationYear | 2001 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0020049 ssj0000454929 |
| Score | 1.4926714 |
| Snippet | The authors design a network security system using an analogy of natural world immunology. We apply not only the immune mechanism that recognizes self or... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 138 |
| SubjectTerms | Communication system security Computer networks Computer security Immune system Information analysis Information security Intrusion detection IP networks Logic programming Protection |
| Title | Design of security system based on immune system |
| URI | https://ieeexplore.ieee.org/document/953403 |
| WOSCitedRecordID | wos000172786100026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV25TgMxELUgooAGCEHcckHrZNfr9VFyJKKIohSA0kU-pTS7KAffH18EkGiQXNhu7LGLmWfPewPAvZLcuUo6xGpmEKFOI06tRE5YUnIupYzlgN7HbDLhs5mYZp3tyIWx1sbkM9sP3fiXb1q9CU9lA1FXJCh77jNGE1Vr95wSlOSip89YK0e-IYMuyOxVCbH7cAJ7OJiFd77GVf7tLAsxGE4eHscBNpb9tNqvqivR6YyO_7XdE9D7Ju_B6c4tnYI923TB0Q_dwTNQPMe8Ddg6uMr162CSdIbBqxnYNnARiCM2T_fA22j4-vSCcukEtPAGrZGRTjNDPZiwQUQOl5XhupSCYheopEo5q6mrMfMRCsYFM5iYwlgqnPQHKXV1DjpN29gLALGPIYiuCm-eJabGXBIhlSJC1UTRQl2CbjB9_pHUMebJ6qs_Z6_BYcrhCu0GdNbLjb0FB_pzvVgt7-KNbgFrhJol |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV27TsMwFLVQQQIWoBTxxgOr28RxnHjk0aqIEHUoqFvlp9QlQW3K92M7poDEgpTB8RJfZ7j32PecA8Ct4LkxCTcoSzOFCDUS5VRzZJgmcZ5zzr0d0FuRlWU-m7FJ0Nn2XBittW8-03039Hf5qpZrd1Q2YGlCnLLntjPOCmStzYGK05LzuT6grVD7uh46J7SXtJjdFhTYAsIgvfP1noT7zjhig2F5d1844Bj32-_98l3xaWd08K8FH4LeN30PTjaJ6Qhs6aoL9n8oDx6D6NF3bsDawFVwsIOtqDN0eU3BuoILRx3RYboHXkfD6cMYBfMEtLABNUhxIzNFLZzQTkYOx4nKZcwZxcaRSYUwWlKT4szWKBhHmcJERUpTZrjdSC6TE9Cp6kqfAohtFUFkEtnwNFEpzjlhXAjCREoEjcQZ6LrQ5--tPsa8jfr8z9kbsDuevhTz4ql8vgB7bUeXey5Bp1mu9RXYkR_NYrW89n_3E66nnW4 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+Tenth+IEEE+International+Workshop+on+Enabling+Technologies%3A+Infrastructure+for+Collaborative+Enterprises.+WET+ICE+2001&rft.atitle=Design+of+security+system+based+on+immune+system&rft.au=Nishiyama%2C+H.&rft.au=Mizoguchi%2C+F.&rft.date=2001-01-01&rft.pub=IEEE&rft.isbn=9780769512693&rft.issn=1080-1383&rft.spage=138&rft.epage=143&rft_id=info:doi/10.1109%2FENABL.2001.953403&rft.externalDocID=953403 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1080-1383&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1080-1383&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1080-1383&client=summon |

