Skip to main content

Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5559))

Abstract

Danger theory-inspired Multi-agent artificial immune system (MAAIS) is applied to intrusion detection systems (IDS). Antigens are profiles of system calls while corresponding behaviors are regarded as signals. The intelligence behind such system is based on the danger theory while dentricit cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. This IDS is based on the dual detections of DC agent for signals and TC agent for antigen, where each agent coordinates with other to calculate danger value (DV). According to DV, immune response for malicious behaviors is activated by either computer host or Security Operating Center (SOC).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hofmeyr, S., Forrest, S.: Immunity by Design. In: Proc. Of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1289–1296 (1999)

    Google Scholar 

  2. Aickelin, U., Bentley, P., Cayzer, S., Kim, J.: Danger Theory: The Link between AIS and IDS. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Boukerche, A., Machado, R., Juca, K., Sobral, J., Motare, M.: An Agent based and Biological Inspired Real-time Intrusion Detection and Security Model for Computer Network Operations. Computer Communications 20, 2649–2660 (2007)

    Article  Google Scholar 

  4. Forrest, S., Beauchemin, C.: Computer Immunology. Computer Communications 20, 2649–2660 (2007)

    Google Scholar 

  5. Greensmith, J., Feyereisl, J., Aickelin, U.: The DCA: SOMe Comparison. Evolutionary Intelligence 1(2), 85–112 (2008)

    Article  Google Scholar 

  6. Nedjah, N., Abraham, A.: Computational Intelligence in Information Assurance and Security. Springer, Heidelberg (2007)

    Book  Google Scholar 

  7. Liu, S., Li, T., Wang, D., Zhao, K., Gong, X., Hu, X., Xu, C., Liang, G.: Immune Multi-agent Active Defense Model for Network Intrusion. In: Wang, T.-D., Li, X.-D., Chen, S.-H., Wang, X., Abbass, H.A., Iba, H., Chen, G.-L., Yao, X. (eds.) SEAL 2006. LNCS, vol. 4247, pp. 101–111. Springer, Heidelberg (2006)

    Google Scholar 

  8. Yeom, K.-W., Park, J.-H.: An Artificial Immune System Model for Multi Agents based Resource Discovery in Distributed Environments. In: ICICIC 2006 (2006)

    Google Scholar 

  9. Gu, F., Aickelin, U., Greensmith, J.: An Agent-based Classification Model

    Google Scholar 

  10. Matzinger, P.: Tolarance, Danger and the Extended Family. Annual Review in Immunology 12, 991–1045 (1994)

    Article  Google Scholar 

  11. Zhang, J., Liang, Y.: Integrating Innate and Adaptive Immunity for Worm Detection. In: Second International Workshop on Knowledge Discovery and Data Mining (WKDD 2009), pp. 693–696 (2009)

    Google Scholar 

  12. Fu, H., Yuan, X., Wang, N.: Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection. In: 2007 International Conference on Computational Intelligence and Security Workshops, pp. 570–573 (2007)

    Google Scholar 

  13. Kim, J., Wilson, W., Aickelin, U., McLeod, J.: Cooperative Automated Worm Response and Detection ImmuNe Algorithm (CARDINAL) Inspired by T-Cell Immunity and Tolerance. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 168–181. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. The Ten Most Critical Web Application Security Vulnerabilities, 2007 update, 2002-2007 OWASP Foundation (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ou, CM., Ou, C.R. (2009). Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory. In: HÃ¥kansson, A., Nguyen, N.T., Hartung, R.L., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2009. Lecture Notes in Computer Science(), vol 5559. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01665-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01665-3_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01664-6

  • Online ISBN: 978-3-642-01665-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics