SlideShare a Scribd company logo
1 of 7
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2386
Survey: Biological Inspired Computing in the
Network Security
V Venkata Ramana
Associate Professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com
Y.Subba Reddy
Associate Professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: y.subbareddyt@gmail.com
G.Rama Subba Reddy
Associate Professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360
subbareddy1227@gmail.com
Dr.Pandurangan Ravi
Professor & Principal, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ravi_6971@gmail.com
------------------------------------------------------------------ABSTRACT----------------------------------------------------------------
Traditional computing techniques and systems consider a main process device or main server, and technique details generally
serially. They're non-robust and non-adaptive, and have limited quantity. Indifference, scientific technique details in a very
similar and allocated manner, while not a main management. They're exceedingly strong, elastic, and ascendible. This paper
offers a short conclusion of however the ideas from biology are will never to style new processing techniques and techniques
that even have a number of the beneficial qualities of scientific techniques. Additionally, some illustrations are a device given
of however these techniques will be used in details security programs.
Keywords–Bio-Inspired,computing,networksecurity,Robust,adapitive
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: January 20, 2015 Date of Acceptance: January 23, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The power and recognition of current computing systems
is basically as a effect of more agile and quicker CPUs and
additional and additional memory convenience at low
value. Yet, these “traditional” computing ways,
architectures, systems, and networks largely think about a
central process unit or a central server, they method data
serially, and that they rely upon humans to be programmed
and told what to try to (and how). It has some serious
drawbacks. Foremost, the systems don't seem to be
awfully secure. If one a part of a system breaks down, the
complete system is useless. Second, they're not
adaptations. Most computing systems don't read (or have
solely restricted learning capability), and can't change or
adjust to fresh or surprising things while not human
intervention. Third, there's solely restricted measurability.
The bigger the organization becomes, or the extra nodes
are value-added to the network, the upper the employment
of the C.P.U. Or server becomes, till it cannot method all
directions or service requests during a cheap time any
longer.
In comparison, most scientific techniques process details
in a similar and allocated way, without the lifestyle of a
central control. They usually involve a huge variety of
relatively easy personal units, which act in similar and
communicate only regionally. For example, the mind
includes a huge variety of easy nerves (more or less
comparative to on-off switches), each of which is
connected only to a relatively small portion of all other
nerves. Yet quantity of details handling is going on in the
mind, where each neuron works only aspect of the
handling, but they all do so in alike. In social pest hives,
such as bugs and bees, a huge variety of relatively easy
individuals manage to build complex nests or find the
quickest path between the home and a food source, again
in a similar and allocated way. The human immunity
processes is another example, where (simple) personal
defense cells perform only aspect of the complete task, but
there are many of them working together in similar.
[1] This parallel and distributed processing method makes
these systems highly robust. If some individual units
in the system break down, the system as a whole will
still function. In fact, it is easy to repair or replace
broken units without having to “shut down” the entire
system. Furthermore, these systems are highly
scalable. As many individual units can be added as
desired, since there are only local interactions
involved, and there will be no overload on one
particular part of the system. Finally, most systems in
nature are adaptive, either through learning (in
individual organisms) or through evolution (at the
level of populations or species). They can adjust to
changing situations or even cope with entirely new
situations. So, there are many advantages in biological
systems that would be desirable to have in our
computing systems.
In this paper, a quick summary is given of however ideas
from biology are wont to style new computing strategies.
This can be typically mentioned as biologically galvanized
computing [1]. These strategies overcome a number of the
disadvantages of ancient computing, creating them a lot of
strong, adaptive, and ascendible. Especially, 3 examples
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2387
are reviewed: (1) genetic algorithms, (2) neural networks,
and (3) artificial immune systems. Moreover, for everyone
of those 3 strategies, some actual applications within the
space of knowledge security also are represented,
especially in cryptography, life science for security, and
laptop and network security. The biological ideas and
concepts underlying the strategies represented here are
often found in any commonplace textbook on biology, like
[2] and [3].
2. Genetic Algorithms in Cryptography
[2] Genetic algorithms were developed within the 60s and
70s by John Holland and his colleagues and students.
They were used each as easy models of evolution and
adaptation, and as new laptop algorithms to seek out
sensible solutions to troublesome improvement issues.
Later, they became very fashionable as a general
improvement tool, and that they are applied with
success to a good vary of issues. This section offers a
quick summary of the algorithmic rule (more details
are often found in [4], [5], [6], and [7]), and a few
specific applications of genetic algorithms in
cryptography and writing are described.
2.1 Genetic Algorithms
A Genetic Algorithm (GA) could be a unique look for
technique reinforced concepts from genetic and natural
progress and choice. It’s one among variety of process
techniques generally mentioned as natural evolutionary
computation (EC). rather than trying to straight fix a
move, an answer is progressed over time by keeping a
population of (initially random) candidate alternatives,
creating subsequent generations by recombining
completely different components of this best alternatives
within the population. This way, new candidate evaluate
tested reinforced based on current sample, wherever the
look for is target-hunting by a range method that prefers
the (currently) best alternatives within the population to
use to make new (“offspring”) alternatives.
Given some optimization disadvantage, first an
appropriate cryptography for applicant alternatives has to
be discovered. Usually, this cryptography requires the way
of personality post like bit post (i.e., post of 0s and 1s).
This is often analogous to the scientific difference between
the genotype (the inherited encoding) and also the
cosmetics (the real type and appearance) of a living thing.
As an example, in chart problems wherever some the best
possible set or partition of the nodes has to be discovered
(such as a lowest protect or most cut set), a little sequence
cryptography are often used wherever every bit place
matches to 1 particular node within the chart.
Development of the particular applicant quality
(phenotype) from a given bit sequence (genotype) is
finished as follows. For every bit with value one, the
corresponding node within the chart is surrounded within
the applicant set (or placed on one aspect of the applicant
partition), and for every bit with value zero, the
corresponding node isn't surrounded within the set (or
placed on the other aspect of the partition). This way, the
GA will straight look for the (much simpler) place of bit
post rather than the place of real applicant alternatives,
even as organic progress happens at the level of
genotypes.
Next, a fitness function needs to be designed which can be
used to evaluate candidate alternatives. The main idea is
that this operate takes as its input an secured candidate
solution (e.g., a bit string), converts this into an actual
candidate solution (e.g., a partition of the nodes of a
graph), and returns a variety according to how good this
candidate solution is for the given issue (e.g., the count of
sides between nodes from different sides of the partition
for the maximum cut problem). This number, and fitness
value, indicates the “goodness” of a candidate solution:
higher fitness values mean better solution. This way, the
GA can perform choice based on these fitness principles,
just as natural choice happens at the level of the
phenotypes.
Given an appropriate development and fitness function
(which have to be developed independently for each
optimization problem that is considered), the real criteria
is relatively simple. Supposing a bit sequence
development is used, the primary GA performs as follows
which is proven in Algorithm 1 (the choice and cross-over
& mutation providers are described below):
Algorithm 1: Selection and Mutation process [12]
1. Initialize the population with N random bit
strings (“individuals”), calculate their fitness
values, and set gen=1.
2. Create a “mating pool” by selecting (with
replacement) N individuals from the current
population based on fitness.
3. While still individuals in the mating pool, do:
a. Remove the next pair of individuals
(“parents”) from the mating pool.
b. With probability cp perform crossover
between the parents to create two
“children”.
c. With probability mp perform mutation
on the children.
d. Place the children in the new population.
4. Replace the previous population with the new
population, calculate the fitness of all individuals,
and set gen=gen+1.
5. If gen < M go to step 2, otherwise stop.
There are many ways in which the selection operator can
be implemented, but the main idea is that individuals with
higher fitness values, compared to the rest of the
population, have a higher chance of being selected than
individuals with lower fitness values (i.e., fitness
proportionate selection). In other words, the mating pool
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2388
will (on average) contain multiple copies of the best
individuals in the current population and no (or just a few)
copies of the worst individuals.
The crossover operator literally chops up the genotypes of
the parent individuals and recombines them to create
offspring genotypes. The most basic method is one-point
crossover, in which a random crossover point is first
chosen (somewhere between the first and last bit), and the
first part of the first parent is recombined with the second
part of the second parent to create the first child (and vice
versa for the second child). Usually crossover is done with
a certain probability cp (often set in the range [0.6;0.95])
for each pair of parents. If crossover is not performed, the
children will be identical to their parents. Finally, with a
usually very low probability mp
, mutation is performed,
where a bit is flipped at random. Examples of (one-point)
crossover and mutation are shown below. In the crossover
example, the crossover point is (randomly) chosen
between the 3rd
and 4th
bit. In the mutation example, the 0
at the 9th
position is mutated into a 1 (shown in bold).
crossover mutation
0000000000 0001111111 0101010101
010101111
1111111111 1110000000
Finally, the creation of new generations of candidate
solutions by selection and crossover & mutation is
repeated for a set number M of generations. Other
stopping criteria are possible, of course, such as reaching a
certain level of fitness or a maximum amount of
computing time. In short, the main idea of the algorithm is
to evolve better and better solutions by repeatedly
selecting the best candidate solutions from the current
population and recombining parts of their genotypes to
create subsequent generations of candidate solutions.
2.2 Applications of Genetic Algorithms in
Cryptography and Coding
A little summary of the status of the art and of still start
issuing in using transformative calculation methods (such
as genetic algorithms) in secret writing is presented in [8].
In cryptography, it is very important know how
challenging it is to “break” a security technique.
Obviously, methods that are very challenging to crack are
recommended over methods that are more quickly
damaged. Cryptanalysis is all about examining (or
“attacking”) security methods to distinguish out how
comfortable or challenging they are to break. Genetic
methods have been applied efficiently in this field, for
example in fighting replacement ciphers [9], [10] and
transposition ciphers [11]. Although this does not straight
cause better ciphers, it does display where their weak
points are, which often can help in raising them.
Furthermore, in [12] an inherited criteria were utilized
efficiently to discover Boolean features with good
cryptographic qualities, thus displaying how these
methods can also be used straight for building security
methods.
An essential strategy that is frequently used in
cryptography is that of producing pseudo random
numbers. Hither, the aim is to get a random act (by some
deterministic method) that is “every bit singular as
possible”, and which bears a higher interval (i.e., it will
not answer it again itself quickly). An exciting scheme,
using a transformative strategy just like GAs, was
presented in [13], where mobile automata (simple identical
and allocated processing devices) were advanced to
generate pseudo unique figures with a higher degree of
entropy.
As an example, consider programming methods for
transmitting information. Next to offering information
protection through protection, it is likewise important that
information reduction is reduced during transmitting of
secured data. Inherited methods have been applied
efficiently to improve so-called “turbo codes” [14]. In this
situation, the GA was able to find a small bit better rule
than what was usable at the time.
These programs are just a selection of the many
opportunities of implementing inherited methods and other
transformative calculations techniques in the area of
information security. Next, an introduction to sensory
systems, another naturally motivated processing method,
is provided.
3. Neural Networks in Biometrics for Security
[3] The research on neural networks was pioneered by
McCulloch and Pitts in 1943 [15]. They gave a logical
(mathematical) model of a simple neuron, and
demonstrated that a suitably constructed network of
such “artificial neurons” can, in principle, compute
any computable function. Thusly, a neural network is
equivalent (in terms of computational power) to a
general Turing machine, but with a very different
architecture. In this section, first the concept of neural
networks is briefly surveyed. A full introduction to
computing with neural networks is provided in [16],
and more detailed info can be found in any standard
textbook on neural networks, such as [17] and [18].
Next, an example of an application of neural networks
in biometrics for security is traced.
3.1 Neural Networks
A neural networks (NN) is a parallel distributed
processing (PDP) structure that is prepared after the
working of the brain. It can perform calculations, in
particular category of information, and provides an
example of an alternative design of calculations as
opposed to serially and centrally based calculations of
conventional handling systems.
Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 4 Pages: 2386-2392 (2
Our minds involve many (around 10 billion)
known as nerves. Each neuron includes a
body, an axon (a pointed “transmission
which substance alerts can travel), and man
treelike framework of many branching “tent
end in synapses which type relationships wi
other nerves. Basically put, each neuron ge
(the existence or lack of signals) from
through the synaptic relationships, which
the dendrites of the mobile whole bod
information are “added up”, and if a c
obtained the neuron delivers out an in
through its axon, which is then developed
yet other nerves which are linked w
Nevertheless, not all synaptic relationships
Some are more powerful than others, a
information has a greater “weight” than othe
obtained by modifying the strong points
current synaptic relationships, or by prep
removing old relationships.
A simplified example of a real neuron is ill
figure below. A neuron receives inputs (
x
neurons, which are weighted ( iw
) and the
The production of a neuron is a function of
sum of inputs, and can in turn constitute the
nerve cells input to other neurons. In the
each input can be either 0 (absence of
(presence of signal), and the output func
function such that the output is 0 if the we
inputs is below a certain threshold value,
above the threshold value. In more reali
inputs and outputs are real valued number
range, and the output function is for examp
shape which is shown in figure 1.
Figure 1: Neural Network Architecture
Any variety of such nerves can be linked w
to type an synthetic sensory system. A
system structure that is often used is a
system. In such a NN, there is one part of fe
one or more levels of “hidden” nerves, an
outcome nerves, as shown in the determin
web page. The nerves in the feedback part
with some feedback design, and the results
ons
2015) ISSN: 0975-0290
) simple tissues
mobile whole
line” through
ny dendrites (a
tacles”), which
ith the axons of
ets information
m other nerves
journey down
dy. Here, the
ertain limit is
ndication itself
an feedback to
with its axon.
are equivalent.
and then some
ers. Studying is
s (weights) of
paring new or
lustrated in the
ix
) from other
en added ( y ).
f this weighted
e input to other
simplest case,
f signal) or 1
ction is a step
eighted sum of
and 1 if it is
stic cases, the
rs within some
ple a sigmoidal
with each other
A conventional
nourish ahead
eedback nerves,
nd one part of
ne on the next
t are initialized
s from this part
go “forward” and provide as infor
invisible part. These nerves then ge
which provide as information to the n
present), until the ultimate, or outcom
The condition of the nerves in the ou
be considered as the “answer”. For e
issues, if the condition of the first outc
that of the second one is 0, the feedb
category. If their last declares are cha
respectively), then the feedback link
category (assuming there are two ses
partition the inputs). Other system
course also possible, such as repea
relationships can nourish returning to
or lines systems, where the nerves are
with relationships between nearby n
expalianed in figure 2.
Figure 2: Internal Architecture of Neur
Given some neural network structur
apparent how to set the loads on the r
certain system actions. However,
methods have been developed to impro
primary concept of these methods
existing the system with example inf
the appropriate response is known. The
are then modified based on the q
between the appropriate response and
system. This is recurring until no
created, or the quantity of mistake dr
limit. The system can now be said to
given process. At the next level, the sy
execute the process on new informatio
have seen before.
3.2 Applications of Neural Networ
Recognition
One place where neural networks
popular is picture handling, such as d
and category, disturbance filtration, ad
etc. As an program in biometrics for
be used efficiently for finger marks id
print identification is often divided up
function removal, and (2) category.
certain functions from a finger marks p
2389
mation to the first
enerate their results
next invisible part (if
me, part is achieved.
utcome part can then
example, in category
come neuron is 1 and
back linked with one
anged (i.e., 0 and 1,
ked with the other
ssions into which to
architectures are of
ted systems, where
past levels as well,
organized in a lines
nerves. This will be
ral Network
re, it is not straight
relationships to get a
several coaching
ove these loads. The
is to continuously
formation for which
e loads in the system
quantity of mistake
d that given by the
more mistakes are
rops below a certain
have discovered the
ystem can be used to
on which it might not
rks in Fingerprint
have become very
design identification
dvantage recognition,
protection, they can
dentification. Finger
p in two stages: (1)
In the first level,
picture are produced,
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2390
such as variety guidelines, archways and whorls, delta
points, etc. (for a more specific summary, see for example
[19]). In the second level, these functions are used to
identify (or classify) the given finger marks picture.
Neural systems have been used efficiently in both of these
levels, often providing increase to high correct category
prices and low incorrect being rejected prices, and
frequently outperforming more conventional methods (see
for example [20], [21], [22], [23], and [24]). Furthermore,
sensory systems can be used in the same way for other
picture identification projects in biometrics protection,
such as retina or eye check out categories, or for speech
identification.
Finally, as a last example of naturally motivated handling
in the place of information protection, a brief summary of
synthetic immunity processes for computer protection is
provided in the next section.
4. Artificial Immune Systems for Computer Security
A very recent concept that is still being developed is that
of building a pc defense mechanisms. The task of such a
program is to provide pc and network security based on
the technicalities of the individual defense mechanisms.
This area first provides a high-level and somewhat simple
summary of the individual defense mechanisms. A good
release to this subject can be found in [25]. Next, an
example of an execution of a simple pc defense
mechanisms is given to demonstrate the usefulness of the
concept.
4.1 The human Immune System
The individual defense mechanisms is a complicated and
multi-layered program. The aspect that is of most attention
here is the flexible defense reaction. A brief summary of
this is given below, with many information remaining out.
However, the common qualities of this aspect of the
defense mechanisms provide as a place to start for the
style of a synthetic immunity processes for computer and
system protection.
The body system includes many different kinds of
elements (mostly proteins), which are generally known as
“self”. Everything else, such as things that make us ill, is
generally known as “non-self”. So, the main process of the
defense mechanisms is to differentiate “non-self” from
“self”, and induce a reaction whenever “non-self”
necessary protein are recognized. However, this is not
always easy as there are an approximated “non-self”
necessary protein that the immunity processes needs to
identify, in comparison to about “self” necessary protein.
The way the defense mechanisms resolves this problem is
by using a powerful and allocated program.
Whenever you want, many “detector” tissues, such as so-
called T-cells, flow through our organizations. These
tissues older in a body known as the thymus, where they
are revealed to most of the “self” necessary proteins that
create up our systems. If any of the growing T-cells holds
to any of these “self” necessary proteins, that T-cell is
transferred. Hence, the only T-cells that prevent the
thymus are those that do not unite to “self” necessary
proteins. Therefore, if a grew up T-cell does combine to a
protein, it suggests this must be a “non-self” proteins, and
an appropriate defense reaction will be triggered.
Nevertheless, not all T-cellular telephones are capable to
merge two (or “recognize”) entirely possible “non-self”
necessary proteins, but some T-cells combine to some
“non-self” necessary proteins, other T-cells to others, etc.
In this way, the defense mechanisms is an allocated
program.
[4] It is also powerful, as T-cells are consistently changed
through an inherited process such as the difference (or
unique “mutations”). This way, the set of “non-self”
necessary protein that the defense mechanisms is able
to identify, changes eventually. Since it is impossible
to identify all possible “non-self” necessary protein at
any once, this powerful program is the next best
solution. Furthermore, because of this, no two
individuals will have exactly the same set of T-cells at
some point, so what might make me fed up, my next
door neighbor might be safe from, and the other way
around.
[5]
Lastly, the defense mechanisms also has a “memory”. It is
able of keeping in mind illness-causing “non-self”
necessary protein (antigens), so that when a person gets
contaminated with the same antigen, it is identified
instantly and an appropriate defense reaction can be
activated, avoiding the real sickness from happening
again.
4.2 Computer Immunology
Forrest and learners were some of the officers of using
concepts from the human immunity processes to design an
attack recognition program for computer systems and
systems [26], [27]. In particular, in [28] they show the
results of a basic execution based on checking short series
of program phone calls. Temporarily, the idea is as
follows. In the first level, a data source of program contact
series during “normal” activities is built. This data source
thus contains the series that represent “self”. In the next
level, program contact series are examined during program
function that might contain attack efforts. These series are
then as opposed to available data source, and any series
that is not present in the data source (“non-self”) activates
an “alarm”. This way, irregular activities can be easily
recognized, and appropriate activities can be conducted if
necessary.
Obviously, the data source containing regular actions have
to be modified regularly. For example, including new
customers or application and components to the program
will modify the regular actions, or a user’s actions might
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2391
modify over time (different projects, different main
concerns, etc.). However, with this style, the attack
recognition program becomes more flexible, as it is able of
acknowledging irregular actions that has not been noticed
before. In other terms, the program can recognize, for
example, new malware or new fighting systems, without
the need for installing new malware “signatures” from
some main server first. Furthermore, different computer
systems will have different data source of “self” actions,
so a malware that infects one pc, might not be able to
contaminate every other pc. This way, the system as a
whole also has a better (distributed) security.
The (small-scale) illustrations and simulator that have
been applied so far indicate the stability of these concepts,
and display a appealing upcoming. Currently, the concepts
and styles are still being designed further, and are also
being grabbed by others [29], [30]. Pc immunology and
synthetic immunity processes are now an effective area of
analysis.
5. Conclusion
Traditional handling techniques have several drawbacks,
such as a lack of sturdiness and flexibility, and limited
scalability. In contrast, scientific techniques, being mostly
similar allocated handling techniques, are highly effective,
convenient, and scalable. Naturally motivated handling
includes the design, execution, and application of new pc
techniques and techniques that integrate these beneficial
qualities of scientific techniques. In this paper, a brief
summary of biologically motivated handling has been
presented, with some specific examples of how these
techniques can be used in details protection in particular.
Many of these techniques have already been applied
efficiently, such as inherited methods and sensory
networks, and some are still being further developed, such
as pc immunology. It is clear that the area of details
protection can benefit greatly from these new and
interesting handling techniques.
References
[1]. L. N. de Castro and F. J. Von Zuben, Recent
Developments in Biologically Inspired Computing.
Idea Group Publishing, 2005.
[2]. S. Alters, Biology: Understanding Life. Mosby,
1996.
[3]. N. A. Campbell, L. G. Mitchell, and J. B. Reece,
Biology: Concepts & Connections, 2nd
edition.
Benjamin Cummings, 1997.
[4]. J. H. Holland, Adaptation in Natural and Artificial
Systems. University of Michigan Press, 1975.
[5]. J. H. Holland, “Genetic Algorithms,” Scientific
American, vol. 267 (1), pp. 66-72, 1992.
[6]. D. E. Goldberg, Genetic Algorithms in Search,
Optimization, and Machine Learning, Addison-
Wesley, 1989.
[7]. M. Mitchell, An Introduction to Genetic Algorithms.
MIT Press, 1996.
[8]. P. Isasi and J. C. Hernández, “Introduction to the
applications of evolutionary computation in
computer security and cryptography,”
Computational Intelligence, vol. 20 (3), pp. 445-449,
2004.
[9]. R. Spillman, M. Janssen, B. Nelson, and M. Kepner,
“Use of a genetic algorithm in the cryptanalysis of
simple substitution ciphers,” Cryptologica, vol. 17
(1), pp. 31-44, 1993.
[10]. A. Clark and E. Dawson, “Optimisation heuristic for
the automated cryptanalysis of classical ciphers,”
Journal of Combinatorial Mathematics and
Combinatorial Computing, vol. 28, pp. 63-86, 1998.
[11]. R. A. J. Matthews, “The use of genetic algorithms in
cryptanalysis,” Cryptologica, vol. 17 (2), pp. 187-
201, 1993.
[12]. W. Millan, A. Clark, and E. Dawson, “An effective
genetic algorithm for finding Boolean functions,” in
Proceedings of the International Conference on
Information and Communications Security, 1997.
[13]. M. Sipper and M. Tomassini, “Co-evolving parallel
random number generators,” in Proceedings of the
Parallel Problem Solving from Nature Conference,
1996, pp. 950-959.
[14]. N. Durand, J.-M. Alliot, and B. Bartolomé, “Turbo
codes optimization using genetic algorithms,” in
Proceedings of the Congress on Evolutionary
Computation, 1999.
[15]. W. S. McCulloch and W. Pitts, “A logical calculus
of the ideas immanent in nervous activity,” Bulletin
of Mathematical Biophysics, vol. 5, pp. 115-133,
1943.
[16]. R. P. Lippmann, “An introduction to computing with
neural nets,” IEEE ASSP Magazine, vol. 4, pp. 4-22,
1987.
[17]. J. A. Anderson, Introduction to Neural Networks.
MIT Press, 1995.
[18]. S. Haykin, Neural Networks: A Comprehensive
Foundation. Prentice-Hall, 1999.
[19]. N. Ratha and R. Bolle, Eds., Automatic Fingerprint
Recognition Systems. Springer-Verlag, 2004.
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2392
[20]. P. A. Hughes and A. D. P. Green, “The use of neural
network for fingerprint classification,” in
Proceedings of the 2nd
International Conference on
Neural Networks, 1991, pp. 79-81.
[21]. M. Kamijo, “Classifying fingerprint images using
neural networks: Deriving the classification state,” in
Proceedings of the 3rd
International Conference on
Neural Networks, 1993, pp. 1932-1937.
[22]. C. L. Wilson, G. T. Candela, and C. I. Watson,
“Neural network fingerprint classification,” Journal
of Artificial Neural Networks, vol. 1 (2), pp. 203-
228, 1994.
[23]. H. V. Neto and D. L. Borges, “Fingerprint
classification with neural networks,” in Proceedings
of the 4th
Brazilian Symposium on Neural Networks,
1997, pp. 66-72.
[24]. A Ceguerra and I. Koprinska, “Automatic fingerprint
verification using neural networks,” in Proceedings
of the International Conference on Artificial Neural
Networks, 2002, pp. 1281-1286.
[25]. C. A. Janeway and P. Travers, Immunobiology: The
Immune System in Health and Disease. Current
Biology Ltd., 2nd
edition, 1996.
[26]. S. Forrest, S. A. Hofmeyr, and A. Somayaji,
“Computer Immunology,” Communications of the
ACM, vol. 40 (10), pp. 88-96, 1997.
[27]. A. Somayaji, S. A. Hofmeyr, and S. Forrest,
“Principles of a computer immune system,” in New
Security Paradigms Workshop, 1998, pp. 75-82.
[28]. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A.
Longstaff, “A sense of self for Unix processes,” in
Proceedings of the IEEE Symposium on Computer
Security and Privacy, 1996.
[29]. J. Kim and P. Bentley, “The human immune system
and network intrusion detection,” in Proceedings of
the 7th
European Conference on Intelligent
Techniques and Soft Computing, 1999.
[30]. J. Kim and P. Bentley, “Towards an artificial
immune system for network intrusion detection: An
investigation of dynamic clonal selection,” in
Proceedings of the Congress on Evolutionary
Computation, 2002, pp. 1015-1020.

More Related Content

What's hot

IJSRED-V2I3P104
IJSRED-V2I3P104IJSRED-V2I3P104
IJSRED-V2I3P104IJSRED
 
Genome structure prediction a review over soft computing techniques
Genome structure prediction a review over soft computing techniquesGenome structure prediction a review over soft computing techniques
Genome structure prediction a review over soft computing techniqueseSAT Journals
 
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...IJDKP
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTSNexgen Technology
 
algorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparencyalgorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparencyPaolo Missier
 
Improving the effectiveness of information retrieval system using adaptive ge...
Improving the effectiveness of information retrieval system using adaptive ge...Improving the effectiveness of information retrieval system using adaptive ge...
Improving the effectiveness of information retrieval system using adaptive ge...ijcsit
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...ijcsa
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Mumbai Academisc
 
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...Avishek Choudhury
 
Neural networks, naïve bayes and decision tree machine learning
Neural networks, naïve bayes and decision tree machine learningNeural networks, naïve bayes and decision tree machine learning
Neural networks, naïve bayes and decision tree machine learningFrancisco E. Figueroa-Nigaglioni
 
Bj32809815
Bj32809815Bj32809815
Bj32809815IJMER
 
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...cscpconf
 
Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...ijdms
 
A clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction ofA clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction ofeSAT Publishing House
 
A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...eSAT Journals
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering SystemIRJET Journal
 
ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...
ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...
ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...ijaia
 

What's hot (20)

IJSRED-V2I3P104
IJSRED-V2I3P104IJSRED-V2I3P104
IJSRED-V2I3P104
 
Introductionedited
IntroductioneditedIntroductionedited
Introductionedited
 
Genome structure prediction a review over soft computing techniques
Genome structure prediction a review over soft computing techniquesGenome structure prediction a review over soft computing techniques
Genome structure prediction a review over soft computing techniques
 
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 
algorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparencyalgorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparency
 
Improving the effectiveness of information retrieval system using adaptive ge...
Improving the effectiveness of information retrieval system using adaptive ge...Improving the effectiveness of information retrieval system using adaptive ge...
Improving the effectiveness of information retrieval system using adaptive ge...
 
V34132136
V34132136V34132136
V34132136
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
 
Neural networks, naïve bayes and decision tree machine learning
Neural networks, naïve bayes and decision tree machine learningNeural networks, naïve bayes and decision tree machine learning
Neural networks, naïve bayes and decision tree machine learning
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
 
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
 
Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...
 
A clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction ofA clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction of
 
A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
 
ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...
ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...
ATTENTION-BASED DEEP LEARNING SYSTEM FOR NEGATION AND ASSERTION DETECTION IN ...
 

Viewers also liked

Approved plots in neemranabehror nh8 3
Approved plots in neemranabehror nh8 3Approved plots in neemranabehror nh8 3
Approved plots in neemranabehror nh8 3Baburaj Patel
 
Resume William Thomas Lord III
Resume William Thomas Lord IIIResume William Thomas Lord III
Resume William Thomas Lord IIIWilliam Lord
 
Multiscale methods for mechanics GIAN course certificate.PDF
Multiscale methods for mechanics GIAN course certificate.PDFMultiscale methods for mechanics GIAN course certificate.PDF
Multiscale methods for mechanics GIAN course certificate.PDFTittu Varghese Mathew
 
Trabajo en Equipo
Trabajo en EquipoTrabajo en Equipo
Trabajo en EquipoYosibel0330
 
Tecnología web II parte
Tecnología web II parteTecnología web II parte
Tecnología web II parteAndreina Trejo
 
Honduras es noticia. La gaceta 28.07.09
Honduras es noticia. La gaceta 28.07.09Honduras es noticia. La gaceta 28.07.09
Honduras es noticia. La gaceta 28.07.09acoesweb
 
International municipal cooperation as a modality for transferring local best...
International municipal cooperation as a modality for transferring local best...International municipal cooperation as a modality for transferring local best...
International municipal cooperation as a modality for transferring local best...Global Risk Forum GRFDavos
 
Westhoffen plu diagnostic_mai 2012
Westhoffen plu diagnostic_mai 2012Westhoffen plu diagnostic_mai 2012
Westhoffen plu diagnostic_mai 2012Mairie de Westhoffen
 

Viewers also liked (14)

Approved plots in neemranabehror nh8 3
Approved plots in neemranabehror nh8 3Approved plots in neemranabehror nh8 3
Approved plots in neemranabehror nh8 3
 
Resume William Thomas Lord III
Resume William Thomas Lord IIIResume William Thomas Lord III
Resume William Thomas Lord III
 
Multiscale methods for mechanics GIAN course certificate.PDF
Multiscale methods for mechanics GIAN course certificate.PDFMultiscale methods for mechanics GIAN course certificate.PDF
Multiscale methods for mechanics GIAN course certificate.PDF
 
CPI_VAC_Brch
CPI_VAC_BrchCPI_VAC_Brch
CPI_VAC_Brch
 
Trabajo en Equipo
Trabajo en EquipoTrabajo en Equipo
Trabajo en Equipo
 
Tecnología web II parte
Tecnología web II parteTecnología web II parte
Tecnología web II parte
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Honduras es noticia. La gaceta 28.07.09
Honduras es noticia. La gaceta 28.07.09Honduras es noticia. La gaceta 28.07.09
Honduras es noticia. La gaceta 28.07.09
 
Denuncia oficina anticorrupción
Denuncia oficina anticorrupciónDenuncia oficina anticorrupción
Denuncia oficina anticorrupción
 
International municipal cooperation as a modality for transferring local best...
International municipal cooperation as a modality for transferring local best...International municipal cooperation as a modality for transferring local best...
International municipal cooperation as a modality for transferring local best...
 
DNN Basics
DNN BasicsDNN Basics
DNN Basics
 
Section 1
Section 1Section 1
Section 1
 
Section 10
Section 10Section 10
Section 10
 
Westhoffen plu diagnostic_mai 2012
Westhoffen plu diagnostic_mai 2012Westhoffen plu diagnostic_mai 2012
Westhoffen plu diagnostic_mai 2012
 

Similar to Survey: Biological Inspired Computing in the Network Security

Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...ijitjournal
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsDinusha Dilanka
 
Final Report
Final ReportFinal Report
Final Reportimu409
 
On Machine Learning and Data Mining
On Machine Learning and Data MiningOn Machine Learning and Data Mining
On Machine Learning and Data Miningbutest
 
Software Testing Using Genetic Algorithms
Software Testing Using Genetic AlgorithmsSoftware Testing Using Genetic Algorithms
Software Testing Using Genetic AlgorithmsIJCSES Journal
 
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...IAEME Publication
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...IAEME Publication
 
Minimizing Musculoskeletal Disorders in Lathe Machine Workers
Minimizing Musculoskeletal Disorders in Lathe Machine WorkersMinimizing Musculoskeletal Disorders in Lathe Machine Workers
Minimizing Musculoskeletal Disorders in Lathe Machine WorkersWaqas Tariq
 
Artificial Intelligence in Robot Path Planning
Artificial Intelligence in Robot Path PlanningArtificial Intelligence in Robot Path Planning
Artificial Intelligence in Robot Path Planningiosrjce
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Mumbai Academisc
 
Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5
Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5
Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5ssuser33da69
 
S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...
S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...
S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...edwinray3
 
copy for Gary Chin.
copy for Gary Chin.copy for Gary Chin.
copy for Gary Chin.Teng Xiaolu
 
Ontology based clustering algorithms
Ontology based clustering algorithmsOntology based clustering algorithms
Ontology based clustering algorithmsIkutwa
 
Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...
Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...
Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...IRJET Journal
 
Biology-Derived Algorithms in Engineering Optimization
Biology-Derived Algorithms in Engineering OptimizationBiology-Derived Algorithms in Engineering Optimization
Biology-Derived Algorithms in Engineering OptimizationXin-She Yang
 
An integrated mechanism for feature selection
An integrated mechanism for feature selectionAn integrated mechanism for feature selection
An integrated mechanism for feature selectionsai kumar
 

Similar to Survey: Biological Inspired Computing in the Network Security (20)

Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
J017446568
J017446568J017446568
J017446568
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
 
Final Report
Final ReportFinal Report
Final Report
 
On Machine Learning and Data Mining
On Machine Learning and Data MiningOn Machine Learning and Data Mining
On Machine Learning and Data Mining
 
Software Testing Using Genetic Algorithms
Software Testing Using Genetic AlgorithmsSoftware Testing Using Genetic Algorithms
Software Testing Using Genetic Algorithms
 
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...
 
Minimizing Musculoskeletal Disorders in Lathe Machine Workers
Minimizing Musculoskeletal Disorders in Lathe Machine WorkersMinimizing Musculoskeletal Disorders in Lathe Machine Workers
Minimizing Musculoskeletal Disorders in Lathe Machine Workers
 
Artificial Intelligence in Robot Path Planning
Artificial Intelligence in Robot Path PlanningArtificial Intelligence in Robot Path Planning
Artificial Intelligence in Robot Path Planning
 
T01732115119
T01732115119T01732115119
T01732115119
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
 
Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5
Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5
Decision treeinductionmethodsandtheirapplicationtobigdatafinal 5
 
S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...
S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...
S.N.Sivanandam & S.N. Deepa - Introduction to Genetic Algorithms 2008 ISBN 35...
 
copy for Gary Chin.
copy for Gary Chin.copy for Gary Chin.
copy for Gary Chin.
 
Ontology based clustering algorithms
Ontology based clustering algorithmsOntology based clustering algorithms
Ontology based clustering algorithms
 
Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...
Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...
Utilizing Machine Learning, Detect Chronic Kidney Disease and Suggest A Healt...
 
Biology-Derived Algorithms in Engineering Optimization
Biology-Derived Algorithms in Engineering OptimizationBiology-Derived Algorithms in Engineering Optimization
Biology-Derived Algorithms in Engineering Optimization
 
An integrated mechanism for feature selection
An integrated mechanism for feature selectionAn integrated mechanism for feature selection
An integrated mechanism for feature selection
 
Final proj 2 (1)
Final proj 2 (1)Final proj 2 (1)
Final proj 2 (1)
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Survey: Biological Inspired Computing in the Network Security

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2386 Survey: Biological Inspired Computing in the Network Security V Venkata Ramana Associate Professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com Y.Subba Reddy Associate Professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: y.subbareddyt@gmail.com G.Rama Subba Reddy Associate Professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 subbareddy1227@gmail.com Dr.Pandurangan Ravi Professor & Principal, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ravi_6971@gmail.com ------------------------------------------------------------------ABSTRACT---------------------------------------------------------------- Traditional computing techniques and systems consider a main process device or main server, and technique details generally serially. They're non-robust and non-adaptive, and have limited quantity. Indifference, scientific technique details in a very similar and allocated manner, while not a main management. They're exceedingly strong, elastic, and ascendible. This paper offers a short conclusion of however the ideas from biology are will never to style new processing techniques and techniques that even have a number of the beneficial qualities of scientific techniques. Additionally, some illustrations are a device given of however these techniques will be used in details security programs. Keywords–Bio-Inspired,computing,networksecurity,Robust,adapitive -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: January 20, 2015 Date of Acceptance: January 23, 2015 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION The power and recognition of current computing systems is basically as a effect of more agile and quicker CPUs and additional and additional memory convenience at low value. Yet, these “traditional” computing ways, architectures, systems, and networks largely think about a central process unit or a central server, they method data serially, and that they rely upon humans to be programmed and told what to try to (and how). It has some serious drawbacks. Foremost, the systems don't seem to be awfully secure. If one a part of a system breaks down, the complete system is useless. Second, they're not adaptations. Most computing systems don't read (or have solely restricted learning capability), and can't change or adjust to fresh or surprising things while not human intervention. Third, there's solely restricted measurability. The bigger the organization becomes, or the extra nodes are value-added to the network, the upper the employment of the C.P.U. Or server becomes, till it cannot method all directions or service requests during a cheap time any longer. In comparison, most scientific techniques process details in a similar and allocated way, without the lifestyle of a central control. They usually involve a huge variety of relatively easy personal units, which act in similar and communicate only regionally. For example, the mind includes a huge variety of easy nerves (more or less comparative to on-off switches), each of which is connected only to a relatively small portion of all other nerves. Yet quantity of details handling is going on in the mind, where each neuron works only aspect of the handling, but they all do so in alike. In social pest hives, such as bugs and bees, a huge variety of relatively easy individuals manage to build complex nests or find the quickest path between the home and a food source, again in a similar and allocated way. The human immunity processes is another example, where (simple) personal defense cells perform only aspect of the complete task, but there are many of them working together in similar. [1] This parallel and distributed processing method makes these systems highly robust. If some individual units in the system break down, the system as a whole will still function. In fact, it is easy to repair or replace broken units without having to “shut down” the entire system. Furthermore, these systems are highly scalable. As many individual units can be added as desired, since there are only local interactions involved, and there will be no overload on one particular part of the system. Finally, most systems in nature are adaptive, either through learning (in individual organisms) or through evolution (at the level of populations or species). They can adjust to changing situations or even cope with entirely new situations. So, there are many advantages in biological systems that would be desirable to have in our computing systems. In this paper, a quick summary is given of however ideas from biology are wont to style new computing strategies. This can be typically mentioned as biologically galvanized computing [1]. These strategies overcome a number of the disadvantages of ancient computing, creating them a lot of strong, adaptive, and ascendible. Especially, 3 examples
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2387 are reviewed: (1) genetic algorithms, (2) neural networks, and (3) artificial immune systems. Moreover, for everyone of those 3 strategies, some actual applications within the space of knowledge security also are represented, especially in cryptography, life science for security, and laptop and network security. The biological ideas and concepts underlying the strategies represented here are often found in any commonplace textbook on biology, like [2] and [3]. 2. Genetic Algorithms in Cryptography [2] Genetic algorithms were developed within the 60s and 70s by John Holland and his colleagues and students. They were used each as easy models of evolution and adaptation, and as new laptop algorithms to seek out sensible solutions to troublesome improvement issues. Later, they became very fashionable as a general improvement tool, and that they are applied with success to a good vary of issues. This section offers a quick summary of the algorithmic rule (more details are often found in [4], [5], [6], and [7]), and a few specific applications of genetic algorithms in cryptography and writing are described. 2.1 Genetic Algorithms A Genetic Algorithm (GA) could be a unique look for technique reinforced concepts from genetic and natural progress and choice. It’s one among variety of process techniques generally mentioned as natural evolutionary computation (EC). rather than trying to straight fix a move, an answer is progressed over time by keeping a population of (initially random) candidate alternatives, creating subsequent generations by recombining completely different components of this best alternatives within the population. This way, new candidate evaluate tested reinforced based on current sample, wherever the look for is target-hunting by a range method that prefers the (currently) best alternatives within the population to use to make new (“offspring”) alternatives. Given some optimization disadvantage, first an appropriate cryptography for applicant alternatives has to be discovered. Usually, this cryptography requires the way of personality post like bit post (i.e., post of 0s and 1s). This is often analogous to the scientific difference between the genotype (the inherited encoding) and also the cosmetics (the real type and appearance) of a living thing. As an example, in chart problems wherever some the best possible set or partition of the nodes has to be discovered (such as a lowest protect or most cut set), a little sequence cryptography are often used wherever every bit place matches to 1 particular node within the chart. Development of the particular applicant quality (phenotype) from a given bit sequence (genotype) is finished as follows. For every bit with value one, the corresponding node within the chart is surrounded within the applicant set (or placed on one aspect of the applicant partition), and for every bit with value zero, the corresponding node isn't surrounded within the set (or placed on the other aspect of the partition). This way, the GA will straight look for the (much simpler) place of bit post rather than the place of real applicant alternatives, even as organic progress happens at the level of genotypes. Next, a fitness function needs to be designed which can be used to evaluate candidate alternatives. The main idea is that this operate takes as its input an secured candidate solution (e.g., a bit string), converts this into an actual candidate solution (e.g., a partition of the nodes of a graph), and returns a variety according to how good this candidate solution is for the given issue (e.g., the count of sides between nodes from different sides of the partition for the maximum cut problem). This number, and fitness value, indicates the “goodness” of a candidate solution: higher fitness values mean better solution. This way, the GA can perform choice based on these fitness principles, just as natural choice happens at the level of the phenotypes. Given an appropriate development and fitness function (which have to be developed independently for each optimization problem that is considered), the real criteria is relatively simple. Supposing a bit sequence development is used, the primary GA performs as follows which is proven in Algorithm 1 (the choice and cross-over & mutation providers are described below): Algorithm 1: Selection and Mutation process [12] 1. Initialize the population with N random bit strings (“individuals”), calculate their fitness values, and set gen=1. 2. Create a “mating pool” by selecting (with replacement) N individuals from the current population based on fitness. 3. While still individuals in the mating pool, do: a. Remove the next pair of individuals (“parents”) from the mating pool. b. With probability cp perform crossover between the parents to create two “children”. c. With probability mp perform mutation on the children. d. Place the children in the new population. 4. Replace the previous population with the new population, calculate the fitness of all individuals, and set gen=gen+1. 5. If gen < M go to step 2, otherwise stop. There are many ways in which the selection operator can be implemented, but the main idea is that individuals with higher fitness values, compared to the rest of the population, have a higher chance of being selected than individuals with lower fitness values (i.e., fitness proportionate selection). In other words, the mating pool
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2388 will (on average) contain multiple copies of the best individuals in the current population and no (or just a few) copies of the worst individuals. The crossover operator literally chops up the genotypes of the parent individuals and recombines them to create offspring genotypes. The most basic method is one-point crossover, in which a random crossover point is first chosen (somewhere between the first and last bit), and the first part of the first parent is recombined with the second part of the second parent to create the first child (and vice versa for the second child). Usually crossover is done with a certain probability cp (often set in the range [0.6;0.95]) for each pair of parents. If crossover is not performed, the children will be identical to their parents. Finally, with a usually very low probability mp , mutation is performed, where a bit is flipped at random. Examples of (one-point) crossover and mutation are shown below. In the crossover example, the crossover point is (randomly) chosen between the 3rd and 4th bit. In the mutation example, the 0 at the 9th position is mutated into a 1 (shown in bold). crossover mutation 0000000000 0001111111 0101010101 010101111 1111111111 1110000000 Finally, the creation of new generations of candidate solutions by selection and crossover & mutation is repeated for a set number M of generations. Other stopping criteria are possible, of course, such as reaching a certain level of fitness or a maximum amount of computing time. In short, the main idea of the algorithm is to evolve better and better solutions by repeatedly selecting the best candidate solutions from the current population and recombining parts of their genotypes to create subsequent generations of candidate solutions. 2.2 Applications of Genetic Algorithms in Cryptography and Coding A little summary of the status of the art and of still start issuing in using transformative calculation methods (such as genetic algorithms) in secret writing is presented in [8]. In cryptography, it is very important know how challenging it is to “break” a security technique. Obviously, methods that are very challenging to crack are recommended over methods that are more quickly damaged. Cryptanalysis is all about examining (or “attacking”) security methods to distinguish out how comfortable or challenging they are to break. Genetic methods have been applied efficiently in this field, for example in fighting replacement ciphers [9], [10] and transposition ciphers [11]. Although this does not straight cause better ciphers, it does display where their weak points are, which often can help in raising them. Furthermore, in [12] an inherited criteria were utilized efficiently to discover Boolean features with good cryptographic qualities, thus displaying how these methods can also be used straight for building security methods. An essential strategy that is frequently used in cryptography is that of producing pseudo random numbers. Hither, the aim is to get a random act (by some deterministic method) that is “every bit singular as possible”, and which bears a higher interval (i.e., it will not answer it again itself quickly). An exciting scheme, using a transformative strategy just like GAs, was presented in [13], where mobile automata (simple identical and allocated processing devices) were advanced to generate pseudo unique figures with a higher degree of entropy. As an example, consider programming methods for transmitting information. Next to offering information protection through protection, it is likewise important that information reduction is reduced during transmitting of secured data. Inherited methods have been applied efficiently to improve so-called “turbo codes” [14]. In this situation, the GA was able to find a small bit better rule than what was usable at the time. These programs are just a selection of the many opportunities of implementing inherited methods and other transformative calculations techniques in the area of information security. Next, an introduction to sensory systems, another naturally motivated processing method, is provided. 3. Neural Networks in Biometrics for Security [3] The research on neural networks was pioneered by McCulloch and Pitts in 1943 [15]. They gave a logical (mathematical) model of a simple neuron, and demonstrated that a suitably constructed network of such “artificial neurons” can, in principle, compute any computable function. Thusly, a neural network is equivalent (in terms of computational power) to a general Turing machine, but with a very different architecture. In this section, first the concept of neural networks is briefly surveyed. A full introduction to computing with neural networks is provided in [16], and more detailed info can be found in any standard textbook on neural networks, such as [17] and [18]. Next, an example of an application of neural networks in biometrics for security is traced. 3.1 Neural Networks A neural networks (NN) is a parallel distributed processing (PDP) structure that is prepared after the working of the brain. It can perform calculations, in particular category of information, and provides an example of an alternative design of calculations as opposed to serially and centrally based calculations of conventional handling systems.
  • 4. Int. J. Advanced Networking and Applicatio Volume: 6 Issue: 4 Pages: 2386-2392 (2 Our minds involve many (around 10 billion) known as nerves. Each neuron includes a body, an axon (a pointed “transmission which substance alerts can travel), and man treelike framework of many branching “tent end in synapses which type relationships wi other nerves. Basically put, each neuron ge (the existence or lack of signals) from through the synaptic relationships, which the dendrites of the mobile whole bod information are “added up”, and if a c obtained the neuron delivers out an in through its axon, which is then developed yet other nerves which are linked w Nevertheless, not all synaptic relationships Some are more powerful than others, a information has a greater “weight” than othe obtained by modifying the strong points current synaptic relationships, or by prep removing old relationships. A simplified example of a real neuron is ill figure below. A neuron receives inputs ( x neurons, which are weighted ( iw ) and the The production of a neuron is a function of sum of inputs, and can in turn constitute the nerve cells input to other neurons. In the each input can be either 0 (absence of (presence of signal), and the output func function such that the output is 0 if the we inputs is below a certain threshold value, above the threshold value. In more reali inputs and outputs are real valued number range, and the output function is for examp shape which is shown in figure 1. Figure 1: Neural Network Architecture Any variety of such nerves can be linked w to type an synthetic sensory system. A system structure that is often used is a system. In such a NN, there is one part of fe one or more levels of “hidden” nerves, an outcome nerves, as shown in the determin web page. The nerves in the feedback part with some feedback design, and the results ons 2015) ISSN: 0975-0290 ) simple tissues mobile whole line” through ny dendrites (a tacles”), which ith the axons of ets information m other nerves journey down dy. Here, the ertain limit is ndication itself an feedback to with its axon. are equivalent. and then some ers. Studying is s (weights) of paring new or lustrated in the ix ) from other en added ( y ). f this weighted e input to other simplest case, f signal) or 1 ction is a step eighted sum of and 1 if it is stic cases, the rs within some ple a sigmoidal with each other A conventional nourish ahead eedback nerves, nd one part of ne on the next t are initialized s from this part go “forward” and provide as infor invisible part. These nerves then ge which provide as information to the n present), until the ultimate, or outcom The condition of the nerves in the ou be considered as the “answer”. For e issues, if the condition of the first outc that of the second one is 0, the feedb category. If their last declares are cha respectively), then the feedback link category (assuming there are two ses partition the inputs). Other system course also possible, such as repea relationships can nourish returning to or lines systems, where the nerves are with relationships between nearby n expalianed in figure 2. Figure 2: Internal Architecture of Neur Given some neural network structur apparent how to set the loads on the r certain system actions. However, methods have been developed to impro primary concept of these methods existing the system with example inf the appropriate response is known. The are then modified based on the q between the appropriate response and system. This is recurring until no created, or the quantity of mistake dr limit. The system can now be said to given process. At the next level, the sy execute the process on new informatio have seen before. 3.2 Applications of Neural Networ Recognition One place where neural networks popular is picture handling, such as d and category, disturbance filtration, ad etc. As an program in biometrics for be used efficiently for finger marks id print identification is often divided up function removal, and (2) category. certain functions from a finger marks p 2389 mation to the first enerate their results next invisible part (if me, part is achieved. utcome part can then example, in category come neuron is 1 and back linked with one anged (i.e., 0 and 1, ked with the other ssions into which to architectures are of ted systems, where past levels as well, organized in a lines nerves. This will be ral Network re, it is not straight relationships to get a several coaching ove these loads. The is to continuously formation for which e loads in the system quantity of mistake d that given by the more mistakes are rops below a certain have discovered the ystem can be used to on which it might not rks in Fingerprint have become very design identification dvantage recognition, protection, they can dentification. Finger p in two stages: (1) In the first level, picture are produced,
  • 5. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2390 such as variety guidelines, archways and whorls, delta points, etc. (for a more specific summary, see for example [19]). In the second level, these functions are used to identify (or classify) the given finger marks picture. Neural systems have been used efficiently in both of these levels, often providing increase to high correct category prices and low incorrect being rejected prices, and frequently outperforming more conventional methods (see for example [20], [21], [22], [23], and [24]). Furthermore, sensory systems can be used in the same way for other picture identification projects in biometrics protection, such as retina or eye check out categories, or for speech identification. Finally, as a last example of naturally motivated handling in the place of information protection, a brief summary of synthetic immunity processes for computer protection is provided in the next section. 4. Artificial Immune Systems for Computer Security A very recent concept that is still being developed is that of building a pc defense mechanisms. The task of such a program is to provide pc and network security based on the technicalities of the individual defense mechanisms. This area first provides a high-level and somewhat simple summary of the individual defense mechanisms. A good release to this subject can be found in [25]. Next, an example of an execution of a simple pc defense mechanisms is given to demonstrate the usefulness of the concept. 4.1 The human Immune System The individual defense mechanisms is a complicated and multi-layered program. The aspect that is of most attention here is the flexible defense reaction. A brief summary of this is given below, with many information remaining out. However, the common qualities of this aspect of the defense mechanisms provide as a place to start for the style of a synthetic immunity processes for computer and system protection. The body system includes many different kinds of elements (mostly proteins), which are generally known as “self”. Everything else, such as things that make us ill, is generally known as “non-self”. So, the main process of the defense mechanisms is to differentiate “non-self” from “self”, and induce a reaction whenever “non-self” necessary protein are recognized. However, this is not always easy as there are an approximated “non-self” necessary protein that the immunity processes needs to identify, in comparison to about “self” necessary protein. The way the defense mechanisms resolves this problem is by using a powerful and allocated program. Whenever you want, many “detector” tissues, such as so- called T-cells, flow through our organizations. These tissues older in a body known as the thymus, where they are revealed to most of the “self” necessary proteins that create up our systems. If any of the growing T-cells holds to any of these “self” necessary proteins, that T-cell is transferred. Hence, the only T-cells that prevent the thymus are those that do not unite to “self” necessary proteins. Therefore, if a grew up T-cell does combine to a protein, it suggests this must be a “non-self” proteins, and an appropriate defense reaction will be triggered. Nevertheless, not all T-cellular telephones are capable to merge two (or “recognize”) entirely possible “non-self” necessary proteins, but some T-cells combine to some “non-self” necessary proteins, other T-cells to others, etc. In this way, the defense mechanisms is an allocated program. [4] It is also powerful, as T-cells are consistently changed through an inherited process such as the difference (or unique “mutations”). This way, the set of “non-self” necessary protein that the defense mechanisms is able to identify, changes eventually. Since it is impossible to identify all possible “non-self” necessary protein at any once, this powerful program is the next best solution. Furthermore, because of this, no two individuals will have exactly the same set of T-cells at some point, so what might make me fed up, my next door neighbor might be safe from, and the other way around. [5] Lastly, the defense mechanisms also has a “memory”. It is able of keeping in mind illness-causing “non-self” necessary protein (antigens), so that when a person gets contaminated with the same antigen, it is identified instantly and an appropriate defense reaction can be activated, avoiding the real sickness from happening again. 4.2 Computer Immunology Forrest and learners were some of the officers of using concepts from the human immunity processes to design an attack recognition program for computer systems and systems [26], [27]. In particular, in [28] they show the results of a basic execution based on checking short series of program phone calls. Temporarily, the idea is as follows. In the first level, a data source of program contact series during “normal” activities is built. This data source thus contains the series that represent “self”. In the next level, program contact series are examined during program function that might contain attack efforts. These series are then as opposed to available data source, and any series that is not present in the data source (“non-self”) activates an “alarm”. This way, irregular activities can be easily recognized, and appropriate activities can be conducted if necessary. Obviously, the data source containing regular actions have to be modified regularly. For example, including new customers or application and components to the program will modify the regular actions, or a user’s actions might
  • 6. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2391 modify over time (different projects, different main concerns, etc.). However, with this style, the attack recognition program becomes more flexible, as it is able of acknowledging irregular actions that has not been noticed before. In other terms, the program can recognize, for example, new malware or new fighting systems, without the need for installing new malware “signatures” from some main server first. Furthermore, different computer systems will have different data source of “self” actions, so a malware that infects one pc, might not be able to contaminate every other pc. This way, the system as a whole also has a better (distributed) security. The (small-scale) illustrations and simulator that have been applied so far indicate the stability of these concepts, and display a appealing upcoming. Currently, the concepts and styles are still being designed further, and are also being grabbed by others [29], [30]. Pc immunology and synthetic immunity processes are now an effective area of analysis. 5. Conclusion Traditional handling techniques have several drawbacks, such as a lack of sturdiness and flexibility, and limited scalability. In contrast, scientific techniques, being mostly similar allocated handling techniques, are highly effective, convenient, and scalable. Naturally motivated handling includes the design, execution, and application of new pc techniques and techniques that integrate these beneficial qualities of scientific techniques. In this paper, a brief summary of biologically motivated handling has been presented, with some specific examples of how these techniques can be used in details protection in particular. Many of these techniques have already been applied efficiently, such as inherited methods and sensory networks, and some are still being further developed, such as pc immunology. It is clear that the area of details protection can benefit greatly from these new and interesting handling techniques. References [1]. L. N. de Castro and F. J. Von Zuben, Recent Developments in Biologically Inspired Computing. Idea Group Publishing, 2005. [2]. S. Alters, Biology: Understanding Life. Mosby, 1996. [3]. N. A. Campbell, L. G. Mitchell, and J. B. Reece, Biology: Concepts & Connections, 2nd edition. Benjamin Cummings, 1997. [4]. J. H. Holland, Adaptation in Natural and Artificial Systems. University of Michigan Press, 1975. [5]. J. H. Holland, “Genetic Algorithms,” Scientific American, vol. 267 (1), pp. 66-72, 1992. [6]. D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, Addison- Wesley, 1989. [7]. M. Mitchell, An Introduction to Genetic Algorithms. MIT Press, 1996. [8]. P. Isasi and J. C. Hernández, “Introduction to the applications of evolutionary computation in computer security and cryptography,” Computational Intelligence, vol. 20 (3), pp. 445-449, 2004. [9]. R. Spillman, M. Janssen, B. Nelson, and M. Kepner, “Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers,” Cryptologica, vol. 17 (1), pp. 31-44, 1993. [10]. A. Clark and E. Dawson, “Optimisation heuristic for the automated cryptanalysis of classical ciphers,” Journal of Combinatorial Mathematics and Combinatorial Computing, vol. 28, pp. 63-86, 1998. [11]. R. A. J. Matthews, “The use of genetic algorithms in cryptanalysis,” Cryptologica, vol. 17 (2), pp. 187- 201, 1993. [12]. W. Millan, A. Clark, and E. Dawson, “An effective genetic algorithm for finding Boolean functions,” in Proceedings of the International Conference on Information and Communications Security, 1997. [13]. M. Sipper and M. Tomassini, “Co-evolving parallel random number generators,” in Proceedings of the Parallel Problem Solving from Nature Conference, 1996, pp. 950-959. [14]. N. Durand, J.-M. Alliot, and B. Bartolomé, “Turbo codes optimization using genetic algorithms,” in Proceedings of the Congress on Evolutionary Computation, 1999. [15]. W. S. McCulloch and W. Pitts, “A logical calculus of the ideas immanent in nervous activity,” Bulletin of Mathematical Biophysics, vol. 5, pp. 115-133, 1943. [16]. R. P. Lippmann, “An introduction to computing with neural nets,” IEEE ASSP Magazine, vol. 4, pp. 4-22, 1987. [17]. J. A. Anderson, Introduction to Neural Networks. MIT Press, 1995. [18]. S. Haykin, Neural Networks: A Comprehensive Foundation. Prentice-Hall, 1999. [19]. N. Ratha and R. Bolle, Eds., Automatic Fingerprint Recognition Systems. Springer-Verlag, 2004.
  • 7. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2392 [20]. P. A. Hughes and A. D. P. Green, “The use of neural network for fingerprint classification,” in Proceedings of the 2nd International Conference on Neural Networks, 1991, pp. 79-81. [21]. M. Kamijo, “Classifying fingerprint images using neural networks: Deriving the classification state,” in Proceedings of the 3rd International Conference on Neural Networks, 1993, pp. 1932-1937. [22]. C. L. Wilson, G. T. Candela, and C. I. Watson, “Neural network fingerprint classification,” Journal of Artificial Neural Networks, vol. 1 (2), pp. 203- 228, 1994. [23]. H. V. Neto and D. L. Borges, “Fingerprint classification with neural networks,” in Proceedings of the 4th Brazilian Symposium on Neural Networks, 1997, pp. 66-72. [24]. A Ceguerra and I. Koprinska, “Automatic fingerprint verification using neural networks,” in Proceedings of the International Conference on Artificial Neural Networks, 2002, pp. 1281-1286. [25]. C. A. Janeway and P. Travers, Immunobiology: The Immune System in Health and Disease. Current Biology Ltd., 2nd edition, 1996. [26]. S. Forrest, S. A. Hofmeyr, and A. Somayaji, “Computer Immunology,” Communications of the ACM, vol. 40 (10), pp. 88-96, 1997. [27]. A. Somayaji, S. A. Hofmeyr, and S. Forrest, “Principles of a computer immune system,” in New Security Paradigms Workshop, 1998, pp. 75-82. [28]. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, “A sense of self for Unix processes,” in Proceedings of the IEEE Symposium on Computer Security and Privacy, 1996. [29]. J. Kim and P. Bentley, “The human immune system and network intrusion detection,” in Proceedings of the 7th European Conference on Intelligent Techniques and Soft Computing, 1999. [30]. J. Kim and P. Bentley, “Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection,” in Proceedings of the Congress on Evolutionary Computation, 2002, pp. 1015-1020.