Skip to main content

Advertisement

Log in

Intelligent agent based artificial immune system for computer security—a review

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

Since its introduction in the 1990s the internet has proliferated in the life of human kind in many numbers of ways. The two by-products of the internet are intelligent agents and intrusions which are far away from each other in the intention of their creation while similar in their characteristics. With automated code roaming the network intruding the users on one side as worms, viruses, and Trojans and autonomous agents tending to help the users on the other side, the internet has given great research challenges to the computer scientists. The greatest challenge of the internet is intrusion, which has increased and never decreased. There are various security systems for the internet. As the Human Immune System protects human body from external attacks, these security systems tend to protect the internet from intruders. Thus the internet security systems are comparable with human immune systems in which autonomous cells move throughout the body to protect it while learning to tackle new threats and keeping them in their memory for the future. These properties are comparable with that of autonomous agents in the internet. Thus intelligent agent technology combined with ideas from human immune system is a great area of research which is still in its developing phase. In this paper, state of the art of security systems which use both these technologies of intelligent agents and artificial immune system i.e., Agent Based Artificial Immune System (ABAIS) for security are reviewed, paying special attention to features of human immune system used in the system, the role of the agents in the ABAIS and the security mechanisms provided against intrusions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Ahmedi MR, Maleki D (2008) An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD). IJCSNS Int J Comput Sci Netw Sec 8(4): 160–169

    Google Scholar 

  • Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceedings of the 1st internat. Conference on aRtificial immune systems (ICARIS-2002), UK, Canterbury, pp 141–148

  • Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection—a review. In: Nicosia G et al (eds) ICARIS 2004, LNCS 3239. Springer, pp 316–329

  • Baumer C, Breugst M, Choy S, Magedanz T (2004) Grasshopper—a universal agent platform based on OMG MASIF and FIPA standards, Grasshopper developed by the ikv++ technologies. Accessed on http://213.160.69.23/grasshopper-website/

  • Boukerche A, Machado RB, Juca KRL, Sobral JBM, Notare MSMA (2007) An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput Commun (30), 2649–2660, Elsevier

  • Bye R, Schmidt S, Luther K, Albayrak S (2008) Application-level simulation for network security. In: Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops, March 03–07, 2008, France, Marseille

  • Byrski A, Carvalho M (2008) Agent-based immunological intrusion detection system for mobile Ad-Hoc networks. In: Bubak M et al (eds) ICCS 2008, Springer, pp 584–593

  • Claessens J, Preneel B, Vandewalle J (2003) (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans Int Technol 3(1): 28–48

    Article  Google Scholar 

  • Dasgupta D (1999) Immunity-based intrusion detection system : a general framework. In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147–160

  • Dasgupta D, Ji Z, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: Proceedings of congress on evolutionary computation conference (CEC). Canberra, Australia: December, pp 123–130

  • Gong X, Li T, Liang G, Wang T, Yang J, Hu X (2006a) Immunity and mobile agent based grid intrusion detection. In: Huang D-S, Li K, Irwin GW (eds) Proceedings of ICIC 2006, LNBI 4115, Springer, pp 651–659

  • Gong X, Li T, Wang T, Yang J, Liu S, Liang G (2006b) An immune mobile agent based grid intrusion detection model. In: Wang T-D et al (eds) Proceedings of SEAL 2006, LNCS 4247, Springer, pp 112–119

  • Gong X, Li T, Wang T, Yang J, Liang G, Hu X (2006c) Grid intrusion detection based on immune agent. In: Jiao L et al (eds) Proceedings of ICNC 2006, Part II, LNCS 4222, Springer, pp 73–82

  • Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: the dendritic cell algorithm. Robust intelligent systems, Springer, London, pp 89–112

  • Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comput 6(3): 252–280

    Article  Google Scholar 

  • Hilker M (2008) Next challenges in bringing artificial immune systems to production in network security. In: Proceedings of BIONETICS, Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org

  • Hu Q, Qui J, Song G (2007) Immune multi-agent network intrusion defense model. In: Proceedings of the third international conference on natural computation (ICNC 2007), pp 2875–2879

  • Ishida Y (2008) The next generation of immunity-based systems: from specific recognition to computational intelligence. Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091–1121

  • Kim J, Bentley J P, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection—a review. Natural computing, vol 6. Springer, Berlin, pp 413–466

  • Le Boudec J-Y, Sarajanovic S (2004) An artificial immune system approach to misbehavior detection in mobile Ad-Hoc networks. In: Proceedings of Bio-ADIT 2004 (The first international workshop on biologically inspired approaches to advanced information technology), Lausanne, Switzerland, pp 96–111

  • Liu S, Li T, Wang D, Zhao K, Gong X, Hu X, Xu C, Liang G (2006) Immune multi-agent active defense model for network intrusion. In: Wang et al (eds) SEAL 2006, LNCS 4247, Springer, pp 104–111

  • Liu S, Li T, Wang D, Hu X, Xu C (2007) Multi-agent network intrusion active defense model based on immune theory, Wuhan University. J Nat Sci 12(1): 167–171

    Google Scholar 

  • Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative AIS framework for intrusiondetection. In: Proceedings of the international conference on communications, Glasgow, pp 1409–1416, doi:10.1109/ICC.2007.237

  • Machado RB, Boukerche A, Sobral JBM, Juca KRL, Notare Mirela SMA (2005) A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations. In: Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05), 1530-2075/05

  • Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: Apolloni B et al (eds) KES 2007/ WIRN 2007, LNAI 4694, Springer, pp 821–829

  • Watanabe Y, lshida Y (2004) Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. In: Proceedings of artificial life robotics (ISAROB, 2004), vol 8, pp 163–167

  • Yampolskiy RV, Govindaraju V (2007) Computer security: a survey of methods and systems. J Comput Sci 3(7): 478–486

    Article  Google Scholar 

  • Yang J, Liu XJ, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowledge-based systems 22(2):115–119, Elsevier

    Google Scholar 

  • Yeom K-W, Park J-H (2005) An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks. In: Hao Y et al (eds) CIS 2005, Springer, pp 204–211

  • Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729–740, Springer

    Google Scholar 

  • Zhang Z, Luo W, Wang X (2005) Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B ‘05, Beijing, (2):748–753. doi:10.1109/ICNNB.2005.1614734

  • Zhongmin C, Yu W, Baowen X (2007) The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the international conference on wireless communications, Networking and mobile computing. WiCom 2007, Shanghai, pp 1779–1783

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sujatha Srinivasan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ramakrishnan, S., Srinivasan, S. Intelligent agent based artificial immune system for computer security—a review. Artif Intell Rev 32, 13–43 (2009). https://doi.org/10.1007/s10462-009-9131-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-009-9131-8

Keywords