Modeling of Positive Selection for the Development of a Computer Immune System and a Self-Recognition Algorithm

  • Sim, Kwee-Bo (School of Electrical and Electronic Engineering, Chung-Ang University) ;
  • Lee, Dong-Wook (Information and Telecommunication Research Institute, Chung-Ang University)
  • Published : 2003.12.01

Abstract

The anomaly-detection algorithm based on negative selection of T cells is representative model among self-recognition methods and it has been applied to computer immune systems in recent years. In immune systems, T cells are produced through both positive and negative selection. Positive selection is the process used to determine a MHC receptor that recognizes self-molecules. Negative selection is the process used to determine an antigen receptor that recognizes antigen, or the nonself cell. In this paper, we propose a novel self-recognition algorithm based on the positive selection of T cells. We indicate the effectiveness of the proposed algorithm by change-detection simulation of some infected data obtained from cell changes and string changes in the self-file. We also compare the self-recognition algorithm based on positive selection with the anomaly-detection algorithm.

Keywords

References

  1. Journal of Computer Security v.6 Intrusion detection using sequences of system calls S. Hofmeyr; S. Forrest;A. Somayaji
  2. Proc. of the IEEE Symposium on security and Privacy Detecting intrusions using system calls: Alternative data models C. Warrender;S. Forrest;B. Pearlmutter
  3. Proc. of the Genetic and Evolutionary Computation Conference (GECCO2000) Workshop Program An immune agent architecture for intrusion detection D. Dasgupta
  4. Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program An immunity-based security layer model J. Gu;D. Lee;S. Park;K. Sim
  5. Proc. of the Global Telecommunication Conference (GLOBECOM 2000) An antibody layer for internet security J. Gu;D. Lee;K. Sim;S. Park
  6. Trans. on IEICE v.E83-B no.11 An immunity-based security layer against Internet antigens J. Gu;D. Lee;K. Sim;S. Park
  7. Proc. of the IEEE Symposium on Research in Security and Privacy Self-nonself discrimination in a computer S. Forrest;A.S. Perelson;L. Allen;R. Cherukuri
  8. Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program An agent based architecture for a computer virus immune system P. Harmer;G. Lamont
  9. Immunology I. Roitt;J. Brostoff;D. Male
  10. Biology: The science of life R. A. Wallace;G. P. Sanders;R. J. Ferl
  11. Proc. of the New Security Paradigms Workshop Principles of a computer immune system A. Somayaji;S. Hofmeyr;S. Forrest
  12. Communications of the ACM v.40 no.10 Computer immunology S. Forrest;S. Hofmeyr;A. Somayaji https://doi.org/10.1145/262793.262811
  13. Proc. of the IEEE Symposium on Computer Security and Privacy An immunological approach to change detection: algorithms, analysis, and implications P. D'haeseleer;S. Forrest;P. Helman
  14. Artificial Immune Systems and Their Applications An anomaly detection algorithm inspired by the immune system D. Dasgupta;S. Forrest
  15. Proc. of 1st International Conference on Artificial Immune System Negative selection: how to generate detectors M. Ayara;J. Timmis;R. de Lemos;L. de Castro;R. Duncan
  16. Proc. of 1st International Conference on Artificial Immune System Anomaly detection using negative selection based on the r-contiguous matching rule S. Singh