Abstract
Exponential growth of internet acted as a centrifugal force in the development of a whole new array of applications and services which drives the e-business/ commerce globally. Now days businesses and the vital services are increasingly dependent on computer networks and the Internet which is vulnerable to the evolving and ever growing threats, due to this the users who are participating in various activities over internet are exposed to many security gaps which can be explored to take advantage. These alarming situations gave rise to the concern about security of computer systems/ networks which resulted in the development of various security concepts and products but unfortunately all these systems somehow fail to provide the desired level of security against ever-increasing threats. Later on it has been observed that there lies a huge analogy between the human immune system (HIS) and computer security systems as the previous protects the body from various external and internal threats very effectively. This paper proposes a general immunity inspired security framework which uses the concepts of HIS in order to overcome the ever growing complex security challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marin A G., Network Security Basics, Security and Privacy, PP 68–72, IEEE, 2005.
Bishop M, Computer Security Art and Science, Pearson Education, 2003.
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Ocotber 2007, KDD Cup 1999.
Richardson Robert, “CSI Computer Crime & Security Survey 2010”, 2011.
Zafar F. M., Naheed F., Ahmad Z. and Anwar M.M., Network Security: A Survey of Modern Approaches, The Nucleus, 45 (1-2), pp 11-31, 2008.
Bishop M, An Overview of Computer Viruses in a Research Environment, 4th DPMA, IEEE, ACM Computer virus and Security Conference, pp 154-163, 1997.
Guillen E, Weakness and Strength Analysis over Network-Based Intrusion Prevention & Prevention Systems” Communications, pp 1-5, 2009.
Chia-Mei Chen, Ya-Lin Chen, Hsiao-Chung Lin, An efficient network intrusion detection, Computer Communications 33, pp 477–484, 2010.
Xiaonan S, Banzhaf W, The use of computational intelligence in intrusion detection systems: A review, App Soft Computing,1–35,2010.
Endorf C., Schultz E. and Mellander J.; Intrusion Detection & Prevention, Published by McGraw Hill, 2004.
Denning E..D., An Intrusion-Detection Model, IEEE Transactions on Software Engineering, Vol. SE-13.No. 2, pp 222-232, 1987.
Mukerjee B., Heberlein T. L., Levitt N. K. Network Intrusion Detection, IEEE Network, pp.26- 41, 1994.
Castro L., Timmis J., Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing, Journal, vol. 7, Issue 7, pp 526-544, 2003.
Dasgupta D., Forrest S. An Anomaly Detection Algorithm Inspired by the Immune System. Chapter 14 in the book entitled Artificial Immune Systems and their Applications, Publisher: Springer-Verlag, Inc., pp. 262–277, January 1999.
Forrest S., Hofmeyr S., Somayaji A., “Computer Immunology,” In Communications of the ACM, vol. 40, no. 10, pp. 88–96, 1997.
Dasgupta D., Yu S., Nino F, Recent Advances in Artificial Immune Systems: Models and Applications, Applied Soft Computing, 11, 1574–1587, 2011.
Forrest S., Hofmeyr A. S., Somayaji A., Longstaff , A sense of self for Unix processes, in Proceedings of the 1996, IEEE Symposium on Security and Privacy, pp 120-128, 1996.
Jungwon K., Bentley P, “The Human Immune System and Network Intrusion Detection”, EUFIT 99, pp 1244-1252, September 1999.
Nishiyama H, Mizoguchi F, “Design of Security System Based on Immune System”, pp 138- 143, IEEE 2001.
Harmer K.. P., Williams D. P., Gunsch H.G., Lamont B. G., An artificial immune system architecture for computer security applications. IEEE transactions on evolutionary computation 6(3), pp 252–280, 2002.
Dasgupta D., Immunity-based Intrusion Detection System: A General Framework, In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147–160, 1999.
Ou M Chung, Host-based intrusion detection systems adapted from agent-based artificial immune systems, Neurocomputing, Elsevier, pp 78-86, 2012.
Timmis J., Hone A., Stibor T., Clark E., Theoretical advances in artificial immune systems, TCS, Elsevier, 403, pp 11-32, 2008.
Zhang Z., Luo W., Wang X., Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B ‘05, Beijing, (2), pp 748–753, 2005.
Ishida Y., The next generation of immunity-based systems: from specific recognition to computational intelligence, Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091–1121, 2008.
Aickelin U., Greensmith J., Twycross J., Immune system approaches to intrusion detection-a review. ICARIS 2004, LNCS 3239.Springer, pp 316–329, 2004.
Overil E R. “Computational immunology and anomaly detection”, Information Security Technical Report, Science Direct, Vol.12, pp 188-191,2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Praneet, S., Verma, B., Sharma, S. (2013). An Immunity Inspired Anomaly Detection System: A General Framework. In: Bansal, J., Singh, P., Deep, K., Pant, M., Nagar, A. (eds) Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). Advances in Intelligent Systems and Computing, vol 202. Springer, India. https://doi.org/10.1007/978-81-322-1041-2_36
Download citation
DOI: https://doi.org/10.1007/978-81-322-1041-2_36
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-1040-5
Online ISBN: 978-81-322-1041-2
eBook Packages: EngineeringEngineering (R0)