A Static Web Immune System and Its Robustness Analysis

A Static Web Immune System and Its Robustness Analysis

Tao Gong
DOI: 10.4018/978-1-60566-310-4.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Static Web immune system is an important applicatiion of artificial immune system, and it is also a good platform to develop new immune computing techniques. On the Static Web system, a normal model is proposed with the space property and the time property of each component, in order to identify the normal state of the system that the artificial immune system protects. Based on the normal model, the Static Web immune sytsem is modelled with three tiers, that is the innate immune tier, the adaptive immune tier and the parallel immune tier. All the three tiers are inspired from the natural immune system. On the tri-tier immune model, the self detection mechanism is proposed and programmed based on the normal model, and the non-self detection is based on the self detection. Besides, the recognition of known non-selfs and unknown non-selfs are designed and analyzed. It is showed that the Static Web immune system is effective and useful for both theory and applications.
Chapter Preview
Top

A.2 Background

Web system is popular on the Internet now and useful for many web users, and web security has become a serious problem due to viruses, worms and faults (Balthrop, Forrest & Newman, et al., 2004; Orman, 2003). To solve the security problem, some detecting techniques are used to recognize the non-selfs such as viruses and faults by matching the features of the non-selfs, but the traditional techniques have a difficult bottleneck in detecting unknown non-selfs especially such as brand-new viruses. To overcome the bottleneck, a new strategy for detecting the unknown non-selfs has been proposed with the normal model of the system that the artificial immune system protects. Current work has been done on the static web system and in fact many static web systems are useful and popular on the Internet, such as the webpage system for many companies and universities.

A.2.1 Space Property of Component

Suppose a static web system S is comprised of m web directories and n files in the cyberspace, and the system can be represented with the set

978-1-60566-310-4.ch011.m01.

Here, pij denotes the jth file in the ith directory of the system S, dk denotes the kth directory in the system S, and ni denotes the sum of all files in the ith directory of the system S.

The components of the static web system are software parts, and the software is used to simulate the physical world in the cyberspace. In the physical world, every object has unique 3-dimension space coordinates and 1-dimension time coordinate, so that the state of the object is uniquely identified by its space-time coordinates (Einstein, 1920). Alike in the cyberspace, every software part has unique location for storing the space property because the storage of the software is based on the hardware in the physical world. The absolute pathname pi is used to represent the location information for storing the file and/or the directory, and the pathname consists of the name ri of the disk or the URL, the name di of the directory and the full name ni of the file ci, shown in Figure 1. The full name of the file includes the file-name of the file and the suffix name of the file, and the suffix name of the file is one of features that are useful for classifying the files.

Figure 1.

3-dimension information of the absolute pathname for files. ©2008 Tao Gong. Used with permission.

978-1-60566-310-4.ch011.f01

According to the basic rules of the operating systems for managing the files, the absolute pathname of the file ci uniquely identifies the location of the file in the computer. One absolute pathname belongs to only one file at a certain time, and at that time the file has only one absolute pathname.

Key Terms in this Chapter

Self Database: The database that stores the space-time information of the selfs is called as the self database.

Parallel Immune Tier: The immune computing tier, which uses parallel computing to increase efficiency and load balance of immune computation, is called as the parallel immune tier of the artificial immune system.

Innate Immune Tier: The immune computing tier, which detects the selfs & non-selfs and recognize all the known non-selfs, is called as the innate immune tier of the artificial immue system.

Probability for Detecting Non-Selfs: The measurement on the probability of the random event that the artificial immune system detects the non-selfs is called as the probability for detecting the non-selfs.

Non-Self Database: The database that stores the feature information of the known non-selfs is called as the non-self database.

Self/Non-Self Detection: The process for detecting the object to decide whether the object is a self or non-self is called as the self/non-self detection.

Adaptive Immune Tier: The immune computing tier, which learn and recognize the unknown non-selfs, is called as the adaptive immune tier of the artificial immune system.

Probability for Learning Unknown Non-Selfs: The measurement on the probability of the random event that the artificial immune system learns the unknown non-selfs is called as the probability for learning the unknown non-selfs.

Normal Model of Normal Static Web System: The set of space-time properties for all the normal components of the normal static web system is called as the normal model of the normal static web system.

Immune Memorization: The process for remembering the unknown non-selfs to transform the non-self into the known ones is called as the immune memorization.

Complete Chapter List

Search this Book:
Reset