License
when quoting this document, please refer to the following
DOI: 10.4230/OASIcs.TrustworthySW.2006.694
URN: urn:nbn:de:0030-drops-6949
URL: http://drops.dagstuhl.de/opus/volltexte/2006/694/

Hilker, Michael ; Schommer, Christoph

SANA - Security Analysis in Internet Traffic through Artificial Immune Systems

pdf-format:
Dokument 1.pdf (107 KB)


Abstract

The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an artificial Immune System with artificial Cells which perform certain Tasks in order to to support existing systems to better secure the Network against Intrusions. The Advantages of SANA are that it is efficient, adaptive, autonomous, and massively-distributed. In this Article, we describe the Architecture of the artificial Immune System and the Functionality of the Components. We explain briefly the Implementation and discuss Results.

BibTeX - Entry

@InProceedings{hilker_et_al:OASIcs:2006:694,
  author =	{Michael Hilker and Christoph Schommer},
  title =	{{SANA - Security Analysis in Internet Traffic through Artificial Immune Systems}},
  booktitle =	{Workshop on Trustworthy Software},
  series =	{OpenAccess Series in Informatics (OASIcs)},
  ISBN =	{978-3-939897-02-6},
  ISSN =	{2190-6807},
  year =	{2006},
  volume =	{3},
  editor =	{Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2006/694},
  URN =		{urn:nbn:de:0030-drops-6949},
  doi =		{http://dx.doi.org/10.4230/OASIcs.TrustworthySW.2006.694},
  annote =	{Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste}
}

Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste
Seminar: Workshop on Trustworthy Software
Issue date: 2006
Date of publication: 26.09.2006


DROPS-Home | Fulltext Search | Imprint Published by LZI