Intelligent agent based artificial immune system for computer security—a review

Since its introduction in the 1990s the internet has proliferated in the life of human kind in many numbers of ways. The two by-products of the internet are intelligent agents and intrusions which are far away from each other in the intention of their creation while similar in their characteristics. With automated code roaming the network intruding the users on one side as worms, viruses, and Trojans and autonomous agents tending to help the users on the other side, the internet has given great research challenges to the computer scientists. The greatest challenge of the internet is intrusion, which has increased and never decreased. There are various security systems for the internet. As the Human Immune System protects human body from external attacks, these security systems tend to protect the internet from intruders. Thus the internet security systems are comparable with human immune systems in which autonomous cells move throughout the body to protect it while learning to tackle new threats and keeping them in their memory for the future. These properties are comparable with that of autonomous agents in the internet. Thus intelligent agent technology combined with ideas from human immune system is a great area of research which is still in its developing phase. In this paper, state of the art of security systems which use both these technologies of intelligent agents and artificial immune system i.e., Agent Based Artificial Immune System (ABAIS) for security are reviewed, paying special attention to features of human immune system used in the system, the role of the agents in the ABAIS and the security mechanisms provided against intrusions.

[1]  Azzedine Boukerche,et al.  A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[2]  Tao Li,et al.  Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..

[3]  Davood Maleki,et al.  An Intrusion Detection Technique using Co-Co Immune System for Distributed Data Networks (CoCo -ISD) , 2008 .

[4]  Jean-Yves Le Boudec,et al.  An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks , 2004, BioADIT.

[5]  Ajith Abraham,et al.  Artificial immune system inspired behavior-based anti-spam filter , 2007, Soft Comput..

[6]  Ki-Won Yeom,et al.  An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.

[7]  Sahin Albayrak,et al.  Application-level Simulation for Network Security , 2010, Simul..

[8]  Julie Greensmith,et al.  Detecting Danger: The Dendritic Cell Algorithm , 2010, ArXiv.

[9]  Wenjian Luo,et al.  Designing Abstract Immune Mobile Agents for Distributed Intrusion Detection , 2005, 2005 International Conference on Neural Networks and Brain.

[10]  Marco Carvalho,et al.  Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.

[11]  Takeshi Okamoto,et al.  Framework of an Immunity-Based Anomaly Detection System for User Behavior , 2007, KES.

[12]  Jin Yang,et al.  Immunity and Mobile Agent Based Grid Intrusion Detection , 2006, ICIC.

[13]  Michael Hilker,et al.  Next Challenges in Bringing Artificial Immune Systems to Production in Network Security , 2008, ArXiv.

[14]  Yoshiteru Ishida,et al.  The Next Generation of Immunity-Based Systems: From Specific Recognition to Computational Intelligence , 2008, Computational Intelligence: A Compendium.

[15]  Dipankar Dasgupta,et al.  Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[16]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[17]  Thomas Magedanz,et al.  GRASSHOPPER - A UNIVERSAL AGENT PLATFORM BASED ON OMG MASIF AND FIPA STANDARDS , 2000 .

[18]  Qiang Hu,et al.  Immune Multi-agent Network Intrusion Defense Model , 2007, Third International Conference on Natural Computation (ICNC 2007).

[19]  Yoshiteru Ishida,et al.  Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems , 2004, Artificial Life and Robotics.

[20]  Chen Zhongmin,et al.  The Algorithm Design of Agent for Detecting and Analyzing Data in Intrusion Detection Based on Immune Principle , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[21]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[22]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[23]  Sahin Albayrak,et al.  Application-level simulation for network security , 2008, Simutools 2008.

[24]  Azzedine Boukerche,et al.  An agent based and biological inspired real-time intrusion detection and security model for computer network operations , 2007, Comput. Commun..

[25]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[26]  Tao Li,et al.  Grid Intrusion Detection Based on Immune Agent , 2006, ICNC.

[27]  Tao Li,et al.  Multi-agent network intrusion active defense model based on immune theory , 2006, Wuhan University Journal of Natural Sciences.

[28]  Zhou Ji,et al.  Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[29]  Tansu Alpcan,et al.  A Cooperative AIS Framework for Intrusion Detection , 2007, 2007 IEEE International Conference on Communications.

[30]  Tao Li,et al.  An Immune Mobile Agent Based Grid Intrusion Detection Model , 2006, SEAL.

[31]  Tao Li,et al.  Immune Multi-agent Active Defense Model for Network Intrusion , 2006, SEAL.

[32]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.