CFP last date
20 December 2024
Reseach Article

Intrusion Detection System using Artificial Immune System

by Inadyuti Dutt, Samarjeet Borah, Indrakanta Maitra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 12
Year of Publication: 2016
Authors: Inadyuti Dutt, Samarjeet Borah, Indrakanta Maitra
10.5120/ijca2016910496

Inadyuti Dutt, Samarjeet Borah, Indrakanta Maitra . Intrusion Detection System using Artificial Immune System. International Journal of Computer Applications. 144, 12 ( Jun 2016), 19-22. DOI=10.5120/ijca2016910496

@article{ 10.5120/ijca2016910496,
author = { Inadyuti Dutt, Samarjeet Borah, Indrakanta Maitra },
title = { Intrusion Detection System using Artificial Immune System },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 12 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number12/25231-2016910496/ },
doi = { 10.5120/ijca2016910496 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:27.925834+05:30
%A Inadyuti Dutt
%A Samarjeet Borah
%A Indrakanta Maitra
%T Intrusion Detection System using Artificial Immune System
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 12
%P 19-22
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nature and natural organisms have always inspired researchers and scientists for solving real world issues. And Computer security is no exception. Artificial Immune System inspired from natural Immune System works efficiently for detecting intrusion in a network. Two layers of defenses: innate system and adaptive system are implemented in this proposed methodology where the innate system mimics the natural Innate Immune System to form the first line of defense. The adaptive system imitates the Adaptive Immune System by incorporating the T-cell and B-cell defensive mechanisms. The results exhibit that the proposed methodology works efficiently for detecting intrusion after inducing malicious attacks on the network system.

References
  1. S Forrest, SA Hofmeyr, A Somayaji, 1997 Computer Immunology Communications of the ACM, Vol. 40, Issue 10, 88-96.
  2. D. Dasgupta, 2007 “Immuno-inspired autonomic system for cyber defense”, Information Security, Tech. Rep., Volume 12, Issue 4, pp. 235-241.
  3. Jamie Twycross, Uwe Aickelin, 2008 “An Immune- Inspired Approach to Anomaly Detection”, Handbook of Research on Information Security and Assurance, Information Science Reference, Hershey, New York.
  4. Jamie Twycross, Uwe Aickelin, Amanda Whitbrook, 2010 “Detecting Anomalous Process Behaviour using Second Generation Artificial Immune”, International Journal for Unconventional Comp., Volume 6, Issue 3–4, pp. 301–326.
  5. Tarek S. Sobha, Wael M. Mostafab, 2011 “A Cooperative Immunological Approach for Detecting Network Anomaly”, Applied Soft Computing, , Volume 11, pp. 1275–1283.
  6. Carlos A. Catania, Carlos García Garino, 2012 “Automatic Network Intrusion Detection: Current techniques and open issues”, Elsevier, Computers & Electrical Engineering, Volume 38, Issue 5, Pages 1062–1072.
  7. Chung-Ming Ou, 2012 “Host-based Intrusion Detection Systems adapted from Agent-based Artificial Immune Systems”, Neurocomputing, Volume 88, pp. 78–86.
  8. Manoj Rameshchandra Thakur, Sugata Sanyal, 2012 “A Multi-Dimensional approach towards Intrusion Detection System”, International Journal of Computer Applications (0975 – 888), Volume 48, Issue 5.
  9. U. Aickelin, D. Dasgupta, 2014 Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, Artificial Immune Systems, Chapter 13, pp. 1-29.
  10. Man-Ki Yoon, Sibin Mohany, Jaesik Choiz, and Lui Sha, 2015 “Memory Heat Map: Anomaly Detection in Real-Time Embedded Systems Using Memory Behavior”, DAC ’15, ACM Digital Library, ISBN: 978-1-4503-3520-1.
  11. Farhoud Hosseinpour, Sureswaran Ramadass, Andrew Meulenberg, Payam Vahdani Amoli and Zahra Moghaddasi, 2013 “Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System”, International Journal of Digital Content Technology and its Applications (JDCTA), Volume 7, Number 9.
  12. Meng-Hui Chen, pei-ChannChang, Jheng-LongWu, 2016 “A Population-based Incremental Learning Approach with Artificial Immune System for Network Intrusion Detection”, Engineering Applications of Artificial Intelligence”, (51)171–181.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS) Immune System (IS) Artificial Immune System (AIS)