Abstract
Since its introduction in the 1990s the internet has proliferated in the life of human kind in many numbers of ways. The two by-products of the internet are intelligent agents and intrusions which are far away from each other in the intention of their creation while similar in their characteristics. With automated code roaming the network intruding the users on one side as worms, viruses, and Trojans and autonomous agents tending to help the users on the other side, the internet has given great research challenges to the computer scientists. The greatest challenge of the internet is intrusion, which has increased and never decreased. There are various security systems for the internet. As the Human Immune System protects human body from external attacks, these security systems tend to protect the internet from intruders. Thus the internet security systems are comparable with human immune systems in which autonomous cells move throughout the body to protect it while learning to tackle new threats and keeping them in their memory for the future. These properties are comparable with that of autonomous agents in the internet. Thus intelligent agent technology combined with ideas from human immune system is a great area of research which is still in its developing phase. In this paper, state of the art of security systems which use both these technologies of intelligent agents and artificial immune system i.e., Agent Based Artificial Immune System (ABAIS) for security are reviewed, paying special attention to features of human immune system used in the system, the role of the agents in the ABAIS and the security mechanisms provided against intrusions.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ahmedi MR, Maleki D (2008) An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD). IJCSNS Int J Comput Sci Netw Sec 8(4): 160–169
Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceedings of the 1st internat. Conference on aRtificial immune systems (ICARIS-2002), UK, Canterbury, pp 141–148
Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection—a review. In: Nicosia G et al (eds) ICARIS 2004, LNCS 3239. Springer, pp 316–329
Baumer C, Breugst M, Choy S, Magedanz T (2004) Grasshopper—a universal agent platform based on OMG MASIF and FIPA standards, Grasshopper developed by the ikv++ technologies. Accessed on http://213.160.69.23/grasshopper-website/
Boukerche A, Machado RB, Juca KRL, Sobral JBM, Notare MSMA (2007) An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput Commun (30), 2649–2660, Elsevier
Bye R, Schmidt S, Luther K, Albayrak S (2008) Application-level simulation for network security. In: Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops, March 03–07, 2008, France, Marseille
Byrski A, Carvalho M (2008) Agent-based immunological intrusion detection system for mobile Ad-Hoc networks. In: Bubak M et al (eds) ICCS 2008, Springer, pp 584–593
Claessens J, Preneel B, Vandewalle J (2003) (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans Int Technol 3(1): 28–48
Dasgupta D (1999) Immunity-based intrusion detection system : a general framework. In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147–160
Dasgupta D, Ji Z, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: Proceedings of congress on evolutionary computation conference (CEC). Canberra, Australia: December, pp 123–130
Gong X, Li T, Liang G, Wang T, Yang J, Hu X (2006a) Immunity and mobile agent based grid intrusion detection. In: Huang D-S, Li K, Irwin GW (eds) Proceedings of ICIC 2006, LNBI 4115, Springer, pp 651–659
Gong X, Li T, Wang T, Yang J, Liu S, Liang G (2006b) An immune mobile agent based grid intrusion detection model. In: Wang T-D et al (eds) Proceedings of SEAL 2006, LNCS 4247, Springer, pp 112–119
Gong X, Li T, Wang T, Yang J, Liang G, Hu X (2006c) Grid intrusion detection based on immune agent. In: Jiao L et al (eds) Proceedings of ICNC 2006, Part II, LNCS 4222, Springer, pp 73–82
Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: the dendritic cell algorithm. Robust intelligent systems, Springer, London, pp 89–112
Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comput 6(3): 252–280
Hilker M (2008) Next challenges in bringing artificial immune systems to production in network security. In: Proceedings of BIONETICS, Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org
Hu Q, Qui J, Song G (2007) Immune multi-agent network intrusion defense model. In: Proceedings of the third international conference on natural computation (ICNC 2007), pp 2875–2879
Ishida Y (2008) The next generation of immunity-based systems: from specific recognition to computational intelligence. Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091–1121
Kim J, Bentley J P, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection—a review. Natural computing, vol 6. Springer, Berlin, pp 413–466
Le Boudec J-Y, Sarajanovic S (2004) An artificial immune system approach to misbehavior detection in mobile Ad-Hoc networks. In: Proceedings of Bio-ADIT 2004 (The first international workshop on biologically inspired approaches to advanced information technology), Lausanne, Switzerland, pp 96–111
Liu S, Li T, Wang D, Zhao K, Gong X, Hu X, Xu C, Liang G (2006) Immune multi-agent active defense model for network intrusion. In: Wang et al (eds) SEAL 2006, LNCS 4247, Springer, pp 104–111
Liu S, Li T, Wang D, Hu X, Xu C (2007) Multi-agent network intrusion active defense model based on immune theory, Wuhan University. J Nat Sci 12(1): 167–171
Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative AIS framework for intrusiondetection. In: Proceedings of the international conference on communications, Glasgow, pp 1409–1416, doi:10.1109/ICC.2007.237
Machado RB, Boukerche A, Sobral JBM, Juca KRL, Notare Mirela SMA (2005) A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations. In: Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05), 1530-2075/05
Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: Apolloni B et al (eds) KES 2007/ WIRN 2007, LNAI 4694, Springer, pp 821–829
Watanabe Y, lshida Y (2004) Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. In: Proceedings of artificial life robotics (ISAROB, 2004), vol 8, pp 163–167
Yampolskiy RV, Govindaraju V (2007) Computer security: a survey of methods and systems. J Comput Sci 3(7): 478–486
Yang J, Liu XJ, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowledge-based systems 22(2):115–119, Elsevier
Yeom K-W, Park J-H (2005) An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks. In: Hao Y et al (eds) CIS 2005, Springer, pp 204–211
Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729–740, Springer
Zhang Z, Luo W, Wang X (2005) Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B ‘05, Beijing, (2):748–753. doi:10.1109/ICNNB.2005.1614734
Zhongmin C, Yu W, Baowen X (2007) The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the international conference on wireless communications, Networking and mobile computing. WiCom 2007, Shanghai, pp 1779–1783
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ramakrishnan, S., Srinivasan, S. Intelligent agent based artificial immune system for computer security—a review. Artif Intell Rev 32, 13–43 (2009). https://doi.org/10.1007/s10462-009-9131-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-009-9131-8