TY - CONF AV - none VL - 1 SN - 9781424423286 N2 - Biologically - inspired computer security has various techniques to solve the problems that facing computer networks security, such as immune system, diversity, danger theory, virus Epidemiology and non-representational approaches. Immune Systems are fairly complex with some unique schemes and are thus a rich source of concepts, which are applicable to a variety of problems. In this paper a new framework together with a set of paradigms for adaptive immune virtual layers implemented by multi-mobile agents based active monitoring of network systems is proposed. Multi-mobile agents combine features of adaptation, self defending and self monitoring of human immune system, that works in parallel with decentralizes control. Adaptive immune virtual layers system could be implemented by Kernel -assisted mobile agents (processes) that migrate between computers and search for a specific abnormal behavior, and take necessary actions: monitoring each other, detecting attacks, eliminating, circulating, and replicating themselves. © 2008 IEEE. Y1 - 2008/// KW - Abnormal behaviors; Active monitoring; Computer securities; Danger theories; Detecting attacks; Human immune systems; Immune systems; Network systems; Virtual layers KW - Computer networks; Computer systems; Computer viruses; Immunology; Information technology; Internet; Security of data; Wireless networks KW - Mobile agents TI - Biological inspired approach in parallel immunology system for network security A1 - Elsadig, M. A1 - Abdullah, A. UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-57349175095&doi=10.1109%2fITSIM.2008.4631545&partnerID=40&md5=489ed4d6c53d2bf12a184d0149c45134 N1 - cited By 2; Conference of International Symposium on Information Technology 2008, ITSim ; Conference Date: 26 August 2008 Through 29 August 2008; Conference Code:74115 ID - scholars299 CY - Kuala Lumpur ER -