作者: Noria Foukia , Melanie Middlemiss
DOI: 10.1007/978-3-642-17348-6_16
关键词:
摘要: In the context of a computer system, security is prevention an illicit action against system. For this purpose, must determine difference between normal and harmful activities. These activities can come from outside or inside system to be protected. similar manner, role Human Immune System (HIS) detect defend harm. This similarity has inspired approaches in area security, including use immune-based build Intrusion Detection Response Systems (IDRSs). As concrete example, chapter introduces new approach for (ID) (IR) completely distributed decentralised IDRS networks. called extended with Agent Mobility, IDReAM short. combines Mobile Agents (MAs) two self-organising paradigms by natural life systems. The (IDS) metaphor immune that protects human body external threats. Specialised cells T cells, travel around possible threats eliminating proteins they do not recognise as safe proteins—referred non-self proteins. (IDAs) roam network suspicious behaviours manner mimics behaviour cells. (IRS) also borrows mechanisms stigmergic paradigm colony ants. At time foraging, ants environment diffuse chemical substance pheromone which traces route other nest source food. (IRAs) respond IDAs’ alerts, mimicking trace alert give response. systems exhibit social organisation their entities, ants, without functionality mobility.