CFP last date
20 January 2025
Reseach Article

Securing Relational Databases with an Artificial Immunity Features

by Ayman Mohamed Mostafa, Mohamed H. Abdel-aziz, Ibrahim M. El-henawy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 4
Year of Publication: 2013
Authors: Ayman Mohamed Mostafa, Mohamed H. Abdel-aziz, Ibrahim M. El-henawy
10.5120/11566-6861

Ayman Mohamed Mostafa, Mohamed H. Abdel-aziz, Ibrahim M. El-henawy . Securing Relational Databases with an Artificial Immunity Features. International Journal of Computer Applications. 68, 4 ( April 2013), 11-16. DOI=10.5120/11566-6861

@article{ 10.5120/11566-6861,
author = { Ayman Mohamed Mostafa, Mohamed H. Abdel-aziz, Ibrahim M. El-henawy },
title = { Securing Relational Databases with an Artificial Immunity Features },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 4 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number4/11566-6861/ },
doi = { 10.5120/11566-6861 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:53.760038+05:30
%A Ayman Mohamed Mostafa
%A Mohamed H. Abdel-aziz
%A Ibrahim M. El-henawy
%T Securing Relational Databases with an Artificial Immunity Features
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 4
%P 11-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Database security is considered one of the major computer science research trends because of its importance in maintaining the privacy, integrity, and confidentiality of data. Human immune system is a set of defense mechanisms that can be used to defend the body against diseases caused by pathogens. Artificial immune system is the artificial simulation of human immunity that can be applied to computer security applications. The main goal of this paper is to develop a database security system based on danger theory. Danger theory is one of the most recent algorithms of artificial immunity that can provide interactive features for securing relational databases. By merging the developed features of artificial immunity to the security system, the secrecy of the database can be maintained.

References
  1. Dasgupta, D. , Ya, S. , and Nino, F. , "Recent Advances in Artificial Immune Systems: Models and Applications," International Journal of Applied Soft Computing, ELSEVIER, 2011
  2. Ming Ou, C. , "Host-based Intrusion Detection Systems Adapted from Agent-based Artificial Immune Systems," International Journal of Neurocomputing, ELSEVIER, 2012
  3. Ji, Z. , and Dasgupta, D. , "Revisiting Negative Selection Algorithms," International Journal of Evolutionary Computation, Massachusetts Institute of Technology, 2007
  4. Forrest, S. , Perelson, A. , Allen, L. , and Cherukuri, R. , "Self-Nonself Discrimination in a Computer," IEEE Symposium on Research in Security and Privacy, 1994
  5. Hashem, M. , El-Henawy, I. , and Mostafa, A. , "Interactive Multi-Layer Policies for Securing Relational Databases," IEEE International Conference on Information Society, UK, 2012
  6. Hosseinpour, F. , Abu Bakar, K. , Hardoroudi, A. , and Kazazi, N. , "Survey on artificial immune system as a bio-inspired technique for anomaly based intrusion detection system," IEEE International Conference on Intelligent Networking and Collaborative Systems, 2010
  7. Hashem, M. , El-Henawy, I. , and Mostafa, A. , "Design and Implementation of Multi-Layer Policies for Database Security," International Conference on Security and Management, USA, 2012
  8. Mostafa, A. , Hashem, M. , and El-Henawy, I. , "Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases," International Journal of Digital Content Technology and its Applications JDCTA, ELSEVIER, 2013
  9. Stibor, T. , Mohr, Ph. , and Timmis, J. , "Is Negative Selection Appropriate for Anomaly Detection?," ACM International Conference on Generic and Evolutionary Computation, 2005
  10. Luo, W. , Wang, X. , Tan, Y. , and Wang, X. , "A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for each Detector," 9th International Conference on Parallel Problem Solving from Nature, Springer, 2006
  11. Luo, W. , Wang, J. , and Wang, X. , "Evolutionary negative selection algorithms for anomaly detection," 8th International Conference on Information Sciences, 2005
  12. J. Timmis, J. , Neal, M. , and Hunt, J. , "An artificial immune system for data analysis," International Journal of Biosystems, ELSEVIER, 2000
  13. Zhang, C. , and Yi, Z. , "An Artificial Immune Network Model Applied to Data Clustering and Classification," 4th International Conference on Neural Networks, Springer, 2007
  14. de Castro, L. N. , and Von Zuben, F. J. , "Learning and optimization using the clonal selection principle," IEEE Transactions on Evolutionary Computations, 2002
  15. Al-Enezi, J. R. , Abbod, M. F. , and Alsharhan, S. , "Artificial Immune Systems- models, Algorithms, and Applications," International Journal of Research and Reviews in Applied Sciences, 2010
  16. Coelho, G. P, and Zuben, F. J. V. , "Omni-aiNet: An Immune-inspired Approach for Omni-optimization," 5th International Conference on Artificial Immune Systems, Springer, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Database security artificial immune system danger theory