Skip to main content

Grid Intrusion Detection Based on Immune Agent

  • Conference paper
Advances in Natural Computation (ICNC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4222))

Included in the following conference series:

Abstract

This paper proposes a novel grid intrusion detection model based on immune agent (GIDIA), and gives the concepts and formal definitions of self, nonself, antibody, antigen, agent and match algorithm in the grid security domain. Then, the mathematical models of mature MoA (mature monitoring agent), and dynamic memory MoA (memory monitoring agent) survival are established. Besides, effects of the important parameter T in the model of mature MoA on system performance are showed. Our theoretical analysis and experimental results show that the model that has higher detection efficiency and steadier detection performance than the current models is a good solution to grid intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proc. of Computer and Communication Security (1998)

    Google Scholar 

  2. Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. In: Proc. of Communications of the ACM, vol. 40, pp. 88–96 (1997)

    Google Scholar 

  3. Somayaji, A., Hofmeyr, S.A., Forrest, S.: Principles of a Computer Immune System. In: Proc. of the New Security Paradigms 1997, pp. 75–82 (1997)

    Google Scholar 

  4. Li, T.: Compute immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  5. Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin, 2650–2657 (2005)

    Google Scholar 

  6. Li, T.: An immunity based network security risk estimation. Science in China Ser. F. Information Sciences, 557–578 (2005)

    Google Scholar 

  7. Li, T.: A New Model for Dynamic Intrusion Detection. LNCS, pp. 72–84. Springer, Heidelberg (2005)

    Google Scholar 

  8. Dasgupta, D.: Immunity-based intrusion detection system: A general framework. In: Proc. of 22nd National Information Systems Security Conference, pp. 147–160 (1999)

    Google Scholar 

  9. Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An Artificial Immune System Architecture for Computer Security Applications. In: Proc. of IEEE Transactions on Evolutionary Computation, vol. 6 (2002)

    Google Scholar 

  10. Murshed, M., Buyya, R., Abramson, D.: GridSim: A Grid Simulation Toolkit for Resource Management and Scheduling in Large-Scale Grid Computing Environments. In: Proc. of the 17th IEEE International Symposium on Parallel and Distributed (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gong, X., Li, T., Wang, T., Yang, J., Liang, G., Hu, X. (2006). Grid Intrusion Detection Based on Immune Agent. In: Jiao, L., Wang, L., Gao, X., Liu, J., Wu, F. (eds) Advances in Natural Computation. ICNC 2006. Lecture Notes in Computer Science, vol 4222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881223_10

Download citation

  • DOI: https://doi.org/10.1007/11881223_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45907-1

  • Online ISBN: 978-3-540-45909-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics