10.1.1.42.4146.pdf

8
Immunity by Design: An Articial Immune System Steven A. Hofmeyr  and  Stephanie Forrest Dept. of Computer Science University of New Mexico Albuquerque, NM 87131-1386 steveah,forrest  @cs.unm.edu Abstract We describe an articial immune system (AIS) that is distributed, robust, dynamic, diverse and adapt ive . It captures man y feature s of the ver- tebrate immune system and places them in the context of the problem of protecting a network of computers from illegal intrusions. 1 INTRODUCTI ON The immune system is highly complicated and appears to be pre cis ely tuned to the pr obl em of det ect ing and eli min at- ing infec tions. We belie ve that it also provi des a compel ling example of a dist rib uted infor mati on-pro cess ing syst em, one which we can study for the purpose of designing bet- ter articial adaptive systems. A important and natural ap- plication domain for adaptive systems is that of computer security. A computer security system should protect a ma- chine or set of machines from unauthorized intruders and foreign code, which is similar in functionality to the im- mune system protecting the body ( self ) from invasion by inimical microbes ( nonself ). Because of this c ompel ling similarity, we have designed an “articial immune system” (AIS) to protect computer networks based on immunologi- cal principles, algorithms and architecture. In designing this syste m, we wis h to adher e to cer tai n principles which we have extracted from our study of im- munol ogy: The immune syste m is  diverse, which greatly improves robustness, on both a population and individual level, for example, different people are vulnerable to dif- ferent microbes; it is  distributed , consisting of many com- ponents that interact locally to provide global protection, so there is no central control and hence no single point of failure; it is  error tolerant  in that a few mistakes in classi- cation and response are not catastrophic; it is  dynamic, i.e. individual components are continually created, destroyed, and are circulated throu ghout the body , which incr ease s the temporal and spatial diversity of the immune system allow- ing it to discard components that are useless or dangerous and improve on existing components; it is  self-protecting, i.e. the same mechanisms that protect the body also protect the immune system itself; and it is  adaptable, i.e. it can learn to recognize and respond to new microbes, and retain a memory of those microbes to facilitate future responses. W e regar d thes e princ iples as gener al guidel ines for desi gn. Somet imes we can incorporate thes e princi ples by using al- gori thms or mecha nisms copie d dire ctly from immu nology , but at other times new algorithms are required. We are not primaril y concer ned with mimickin g the immu ne syst em in all its details; rather, we are trying to capture those aspects of the immunesystem tha t are mos t re le va nt to constr uct ing a robust distributed adaptive system. In earlier papers we presented results from this research progr am in the context of compu ter securi ty (e.g., [4]), deemp hasi zing more general consid erat ions. The goal of this paper is to rectify that, making the biological connec- tions more concrete and emphasizing the adaptive systems framework. In the next section (2) we describe the organi- zation of our AIS, in the context of a specic application; most of what is described has been implemented, but some of the ideas are still speculative. The results of testing the system out in a real environment are described in Section 3, and the paper concludes with a discussion of the AIS, including its relation to classier systems [9]. 2 ARCHITECTURE Befor e outli ning the arch itect ure and algor ithms of our adaptive immune system (AIS), we must rst consider the environment in which the AIS will exist. To preserve gen- erality, we represent both the protected system (self) and infec tious agent s (nonself ) as dynamica lly changi ng sets of bit str ings. In cells of the body the prol e of expre ssed proteins (self) changes over time, and likewise, we expect our set of prot ected str ings to var y over time. Simi larl y ,

Upload: dkasrvy

Post on 14-Apr-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 1/8

Page 2: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 2/8

Page 3: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 3/8

Page 4: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 4/8

Page 5: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 5/8

Page 6: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 6/8

Page 7: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 7/8

Page 8: 10.1.1.42.4146.pdf

7/27/2019 10.1.1.42.4146.pdf

http://slidepdf.com/reader/full/1011424146pdf 8/8