Skip to main content
Log in

Toward an artificial immune server against cyber attacks

  • Original Article
  • Published:
Artificial Life and Robotics Aims and scope Submit manuscript

Abstract

This paper proposes a novel framework for an artificial immune server with both innate and adaptive immune functions. The innate immune function detects cyber attacks on a known or unknown vulnerability. Upon detecting a cyber attack, the innate immune function creates a new process of the server application and terminates the compromised process. The adaptive immune function learns the requests with exploit code detected by the innate immune function. The adaptive immune function enables the server application to maintain its own service without terminating the server application after the innate immune function recognizes the attack. Performance tests of a prototype system implemented on a vulnerable web server showed that this prototype system was able to maintain the web service during all attacks except the first.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Microsoft (2015) Enhanced mitigation experience toolkit 5.5 user guide. https://www.microsoft.com/en-us/download/confirmation.aspx?id=50802. Accessed 16 Jun 2016

  2. Cheng Y, Zhou Z, Miao Y, Ding X, Deng H (2014) ROPecker: a generic and practical approach for defending against ROP attack. In: Proceedings of the 21st annual network and distributed system security symposium

  3. Okamoto T (2015) SecondDEP: resilient computing that prevents shellcode execution in cyber-attacks. Procedia Comput Sci 60:691–699

    Article  Google Scholar 

  4. Sano F, Okamoto T, Idris W, Hata Y, Ishida Y (2016) A cyber attack-resilient server inspired by diversity. In: Proceedings of the 21st international symposium on artificial life and robotics, pp 31–35

  5. Kephart JO (1994) A biologically inspired immune system for computers. In: Proceedings of the 4th international workshop on the synthesis and simulation of living systems, artificial life IV, pp 130–139

  6. Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA (1996) A sense of self for unix processes. In: Proceedings of the IEEE symposium on security and privacy, pp 120–128

  7. Shacham H (2007) The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM conference on computer and communications security, , ACM, Washington, D. C., pp 552–561

  8. Willems C, Holz T, Freiling F (2007) Toward automated dynamic malware analysis using cwsandbox. IEEE Secur Priv 2:32–39

    Article  Google Scholar 

  9. Matt_Oh (2014) Technical analysis of CVE-2014-0515 adobe flash player exploit. HP enterprise business community

  10. Jesse K (2006) Identifying almost identical files using context triggered piecewise hashing. Digit Investig 3:91–97

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Takeshi Okamoto.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Okamoto, T., Tarao, M. Toward an artificial immune server against cyber attacks. Artif Life Robotics 21, 351–356 (2016). https://doi.org/10.1007/s10015-016-0282-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10015-016-0282-9

Keywords