Information Security and Computer Security Using Neural Networks and Artificial Human Immune System

Authors

  • S. Senthil kumar Assistant Proessor, Department of Commerce with Computer Applications, Dr.SNS Rajalakshmi College of Arts and Science (Autonomous), Coimbatore, Tamil Nadu, India
  • R. Kanakaraj Assistant Proessor, Department of Commerce with Computer Applications, Dr.SNS Rajalakshmi College of Arts and Science (Autonomous), Coimbatore, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajcst-2016.5.1.1762

Keywords:

Biometric, Neural Networks, Artificial Immune System

Abstract

Human beings are involved in the care and repair of computer systems at every stage in their operation. This level of human involvement will be impossible to maintain in future. Biological and social systems of comparable and greater complexity have self-healing processes which are crucial to their survival. An immune system needs to be cognizant of its local host’s current situation and of its recent history; it must be an expert in intrusion detection. The body’s immune system deals with threats to the operation of the body using a number of pro-active and reactive systems. Additional tasks need to be devoted to protecting and maintaining a computer with an immune system so that human intervention can be minimized. Whether the root cause of the errors is faulty programming or simply a lack of foresight, human intervention is required in computing systems with a regularity which borders on the embarrassing.With an immune system, a computer could detect problem conditions and mobilize resources to deal with them automatically, letting the machine do the work. Although the phrase immune system’ would make many people think immediately of computer viruses, there is much more to the business of keeping systems healthy than simply protecting them from attack by hostile programs. If one thinks of biological systems or other self-sufficient systems, such as cities and communities, some of the most critical subsystems are involved in cleaning up waste products, repairing damage and security through checking and redundancy. It would be unthinkable to do without them.

References

W. S. McCulloch and W. Pitts, "A logical calculus of the ideas immanent in nervous activity," Bulletin of Mathematical Biophysics, vol. 5, pp. 115-133, 1943.

R. P. Lippmann, "An introduction to computing with neural nets," IEEE ASSP Magazine, vol. 4, pp. 4-22, 1987.

J. A. Anderson, Introduction to Neural Networks, MIT Press, 1995.

S. Haykin, Neural Networks: A Comprehensive Foundation, Prentice Hall, 1999.

N. Ratha and R. Bolle, Eds., Automatic Fingerprint Recognition Systems, Springer Verlag, 2004.

P. A. Hughes and A. D. P. Green, "The use of neural networks for fingerprint classification," in Proceedings of the 2nd International Conference on Neural Networks, 1991, pp. 79-81.

M. Kamijo, "Classifying fingerprint images using neural networks: Deriving the classification state," in Proceedings of the 3rd International Conference on Neural Networks, 1993, pp. 1932-1937.

C. L. Wilson, G. T. Candela, and C. I. Watson, "Neural network fingerprint classification," Journal of Artificial Neural Networks, vol. 1, no. 2, pp. 203-228, 1994.

H. V. Neto and D. L. Borges, "Fingerprint classification with neural networks," in Proceedings of the 4th Brazilian Symposium on Neural Networks, 1997, pp. 66-72.

A. Ceguerra and I. Koprinska, "Automatic fingerprint verification using neural networks," in Proceedings of the International Conference on Artificial Neural Networks, 2002, pp. 1281-1286.

C. A. Janeway and P. Travers, Immunobiology: The Immune System in Health and Disease, Current Biology Ltd., 2nd edition, 1996.

S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer Immunology," Communications of the ACM, vol. 40, no. 10, pp. 88-96, 1997.

A. Somayaji, S. A. Hofmeyr, and S. Forrest, "Principles of a computer immune system," in New Security Paradigms Workshop, 1998, pp. 75-82.

S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proceedings of the IEEE Symposium on Computer Security and Privacy, 1996.

J. Kim and R. Bentley, "The human immune system and network intrusion detection," in Proceedings of the 7th European Conference on Intelligent Techniques and Soft Computing, 1999.

J. Kim and P. Bentley, "Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection," in Proceedings of the Congress on Evolutionary Computation, 2002, pp. 1015-1020.

F. M. Burnet, "The Clonal Selection Theory of Acquired Immunity," Vanderbilt Univ. Press, Nashville, TN, 1959.

F. M. Burnet and F. Fenner, The Production of Antibodies, Macmillan, Melbourne/London, 1949.

J. Lederberg, "Science," 1649:129, 1959.

R. E. Billingham, L. Brent, and P. B. Medawar, "Nature," 173:603, 1953.

R. E. Billingham, "Proc. Roy. Soc. London., B173:44, 1956.

P. Matzinger, "Tolerance, danger and the extended family," Annu. Rev. Immun., 12:991, 1994.

Downloads

Published

28-03-2016

How to Cite

Senthil kumar, S., & Kanakaraj, R. (2016). Information Security and Computer Security Using Neural Networks and Artificial Human Immune System. Asian Journal of Computer Science and Technology, 5(1), 21–24. https://doi.org/10.51983/ajcst-2016.5.1.1762