Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 202))

Abstract

Exponential growth of internet acted as a centrifugal force in the development of a whole new array of applications and services which drives the e-business/ commerce globally. Now days businesses and the vital services are increasingly dependent on computer networks and the Internet which is vulnerable to the evolving and ever growing threats, due to this the users who are participating in various activities over internet are exposed to many security gaps which can be explored to take advantage. These alarming situations gave rise to the concern about security of computer systems/ networks which resulted in the development of various security concepts and products but unfortunately all these systems somehow fail to provide the desired level of security against ever-increasing threats. Later on it has been observed that there lies a huge analogy between the human immune system (HIS) and computer security systems as the previous protects the body from various external and internal threats very effectively. This paper proposes a general immunity inspired security framework which uses the concepts of HIS in order to overcome the ever growing complex security challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marin A G., Network Security Basics, Security and Privacy, PP 68–72, IEEE, 2005.

    Google Scholar 

  2. Bishop M, Computer Security Art and Science, Pearson Education, 2003.

    Google Scholar 

  3. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Ocotber 2007, KDD Cup 1999.

  4. Richardson Robert, “CSI Computer Crime & Security Survey 2010”, 2011.

    Google Scholar 

  5. Zafar F. M., Naheed F., Ahmad Z. and Anwar M.M., Network Security: A Survey of Modern Approaches, The Nucleus, 45 (1-2), pp 11-31, 2008.

    Google Scholar 

  6. Bishop M, An Overview of Computer Viruses in a Research Environment, 4th DPMA, IEEE, ACM Computer virus and Security Conference, pp 154-163, 1997.

    Google Scholar 

  7. Guillen E, Weakness and Strength Analysis over Network-Based Intrusion Prevention & Prevention Systems” Communications, pp 1-5, 2009.

    Google Scholar 

  8. Chia-Mei Chen, Ya-Lin Chen, Hsiao-Chung Lin, An efficient network intrusion detection, Computer Communications 33, pp 477–484, 2010.

    Google Scholar 

  9. Xiaonan S, Banzhaf W, The use of computational intelligence in intrusion detection systems: A review, App Soft Computing,1–35,2010.

    Google Scholar 

  10. Endorf C., Schultz E. and Mellander J.; Intrusion Detection & Prevention, Published by McGraw Hill, 2004.

    Google Scholar 

  11. Denning E..D., An Intrusion-Detection Model, IEEE Transactions on Software Engineering, Vol. SE-13.No. 2, pp 222-232, 1987.

    Google Scholar 

  12. Mukerjee B., Heberlein T. L., Levitt N. K. Network Intrusion Detection, IEEE Network, pp.26- 41, 1994.

    Google Scholar 

  13. Castro L., Timmis J., Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing, Journal, vol. 7, Issue 7, pp 526-544, 2003.

    Google Scholar 

  14. Dasgupta D., Forrest S. An Anomaly Detection Algorithm Inspired by the Immune System. Chapter 14 in the book entitled Artificial Immune Systems and their Applications, Publisher: Springer-Verlag, Inc., pp. 262–277, January 1999.

    Google Scholar 

  15. Forrest S., Hofmeyr S., Somayaji A., “Computer Immunology,” In Communications of the ACM, vol. 40, no. 10, pp. 88–96, 1997.

    Google Scholar 

  16. Dasgupta D., Yu S., Nino F, Recent Advances in Artificial Immune Systems: Models and Applications, Applied Soft Computing, 11, 1574–1587, 2011.

    Google Scholar 

  17. Forrest S., Hofmeyr A. S., Somayaji A., Longstaff , A sense of self for Unix processes, in Proceedings of the 1996, IEEE Symposium on Security and Privacy, pp 120-128, 1996.

    Google Scholar 

  18. Jungwon K., Bentley P, “The Human Immune System and Network Intrusion Detection”, EUFIT 99, pp 1244-1252, September 1999.

    Google Scholar 

  19. Nishiyama H, Mizoguchi F, “Design of Security System Based on Immune System”, pp 138- 143, IEEE 2001.

    Google Scholar 

  20. Harmer K.. P., Williams D. P., Gunsch H.G., Lamont B. G., An artificial immune system architecture for computer security applications. IEEE transactions on evolutionary computation 6(3), pp 252–280, 2002.

    Google Scholar 

  21. Dasgupta D., Immunity-based Intrusion Detection System: A General Framework, In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147–160, 1999.

    Google Scholar 

  22. Ou M Chung, Host-based intrusion detection systems adapted from agent-based artificial immune systems, Neurocomputing, Elsevier, pp 78-86, 2012.

    Google Scholar 

  23. Timmis J., Hone A., Stibor T., Clark E., Theoretical advances in artificial immune systems, TCS, Elsevier, 403, pp 11-32, 2008.

    Google Scholar 

  24. Zhang Z., Luo W., Wang X., Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B ‘05, Beijing, (2), pp 748–753, 2005.

    Google Scholar 

  25. Ishida Y., The next generation of immunity-based systems: from specific recognition to computational intelligence, Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091–1121, 2008.

    Google Scholar 

  26. Aickelin U., Greensmith J., Twycross J., Immune system approaches to intrusion detection-a review. ICARIS 2004, LNCS 3239.Springer, pp 316–329, 2004.

    Google Scholar 

  27. Overil E R. “Computational immunology and anomaly detection”, Information Security Technical Report, Science Direct, Vol.12, pp 188-191,2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saurabh Praneet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Praneet, S., Verma, B., Sharma, S. (2013). An Immunity Inspired Anomaly Detection System: A General Framework. In: Bansal, J., Singh, P., Deep, K., Pant, M., Nagar, A. (eds) Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). Advances in Intelligent Systems and Computing, vol 202. Springer, India. https://doi.org/10.1007/978-81-322-1041-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1041-2_36

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-1040-5

  • Online ISBN: 978-81-322-1041-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics