Danger! Computer Security meets Operational Research

نویسندگان

  • Uwe Aickelin
  • Julie Greensmith
چکیده

Artificial Immune Systems (AIS) are a collection of algorithms inspired by aspects of the human immune system. The arguably most obvious application of AIS was to detect intrusions in computer networks. If we can fight viruses with our immune systems, then surely we can fight computer viruses with a computer immune system? Early AIS approaches used a technique called Negative Selection, which did not provide a sufficient level of protection against intrusions. Problems were found with scalability and large numbers of false positives (false alarms) were generated. In 2003, Dr Uwe Aickelin and his colleagues proposed that the reason for the poor performance of the AIS is that Negative Selection is based on outdated concepts in immunology. It was proposed that the incorporation of the Danger Theory, a modern principle of immunology, could improve the performance of AIS when applied to intrusion detection. The result of the proposal is the Danger Project (EPSRC Adventure Fund) – an interdisciplinary collaboration between computer security experts, computer scientists, and 'wetlab' immunologists. Recently, Uwe has been awarded an Advanced ESPRC Fellowship to investigate how OR models such as set covering problems can help direct future research. The work performed to achieve these goals is the focus of this part of the seminar. Instead of trying to improve on existing heuristics, Julie Greensmith spent one year trying to understand the intricate methods the human immune system uses to detect invaders when the body is under attack. A novel idea in immunology is that the immune system releases danger signals in response to damage caused by infection. One cell in particular is involved in the collection and processing of danger signals. These cells are called Dendritic Cells (DCs). DCs are a major control unit cell of the human immune system, but were previously ignored by the AIS

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

Developing an Academic Security Laboratory

Information Security college-level education efforts received a financial shot in the arm late last year with the announcement of a federal funding program to train an information security workforce. In this paper, we address issues surrounding development of a viable Computer Science, Information Security laboratory that meets the three-pronged needs of research education, and outreach in a re...

متن کامل

A Dedicated Hardware Security Module for Field Operational Tests of Car-to-X Communication

In this work a security module is developed, providing FPGA based hardware acceleration for Elliptic Curve Cryptography which meets the requirements of Car-to-X Communication. The module is pluggable via USB to a Car-to-X system and therefore easily deployable within currently running or planed Field Operational Tests.

متن کامل

Securing Relational Databases with an Artificial Immunity Features

Database security is considered one of the major computer science research trends because of its importance in maintaining the privacy, integrity, and confidentiality of data. Human immune system is a set of defense mechanisms that can be used to defend the body against diseases caused by pathogens. Artificial immune system is the artificial simulation of human immunity that can be applied to c...

متن کامل

Applying Formal Methods to an Information Security Device: A Case Study

One approach to assuring information security is to control access to information through an appropriately designed device. A cost-e ective way to provide assurance that the device meets its security requirements is to detect and correct violations of these requirements at an early stage of development: when the operational requirements are speci ed. Once it is demonstrated that an operational ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007