Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusion detection systems are utilized to detect, as fast as possible, user’s account privilege misuse when a prevention mechanism has failed to address such breaches. In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. The dynamic and more complex nature of cybersecurity, as well as the high false positive rate and high false negative percentage in current intrusion detection systems, are examples of such deficiency. In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system mechanisms. Experimental results for the implementation of the proposed algorithm provide a self-learning mechanism for achieving high detection coverage with a low false positive rate by using the signature of previously detected intrusions as detectors for the future detection process. The proposed algorithm can enhance detecting insider threats and eliminate data breaches by protecting confidentiality, ensuring integrity, and maintaining availability. To give an integrated picture, a comprehensive and informative survey for the different research directions that are related to the proposed algorithm is performed.

[2]  Lu Feng,et al.  Towards accurate intrusion detection based on improved clonal selection algorithm , 2017, Multimedia Tools and Applications.

[3]  Thomas Pradeu,et al.  Towards a General Theory of Immunity? , 2017, Trends in immunology.

[4]  Chung-Ming Ou Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems , 2019, 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA).

[5]  Shivashankar B. Nair,et al.  An Immuno-inspired Distributed Artificial Classification System , 2019, SocProS.

[6]  Tarek N. Saadawi,et al.  Distributed Network Intrusion Detection Systems: An Artificial Immune System Approach , 2016, 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[7]  Marin Emilov Pamukov,et al.  Application of artificial immune systems for the creation of IoT intrusion detection systems , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[8]  Yasir Abdelgadir Mohamed,et al.  Implementation of IDS with response for securing MANETs , 2010, 2010 International Symposium on Information Technology.

[9]  Ruirui Zhang,et al.  Study of Immune-Based Intrusion Detection Technology in Wireless Sensor Networks , 2017, Arabian Journal for Science and Engineering.

[10]  Salah Al-Sharhan,et al.  ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .

[11]  Xiangchun Li Progress in Mine Safety Science and Engineering II , 2014 .

[12]  Manuel Eduardo Correia,et al.  An Artificial Immune System for Temporal Anomaly Detection Using Cell Activation Thresholds and Clonal Size Regulation with Homeostasis , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.

[13]  Julie Greensmith,et al.  The Dendritic Cell Algorithm for Intrusion Detection , 2013, Biologically Inspired Networking and Sensing.

[14]  Azuan Ahmad,et al.  CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism , 2017, Int. J. Commun. Networks Inf. Secur..

[15]  Zvi Grossman,et al.  Immunological Paradigms, Mechanisms, and Models: Conceptual Understanding Is a Prerequisite to Effective Modeling , 2019, Front. Immunol..

[16]  Tao Yang,et al.  A Quick Negative Selection Algorithm for One-Class Classification in Big Data Era , 2017 .

[17]  Elsayed M. Zaki,et al.  Artificial immune system based neural networks for solving multi-objective programming problems , 2010 .

[18]  Yashwant K. Malaiya,et al.  A consolidated approach for estimation of data security breach costs , 2016, 2016 2nd International Conference on Information Management (ICIM).

[19]  Paul Kim,et al.  Artificial Immune System (AIS) Based Intrusion Detection System (IDS) for Smart Grid Advanced Metering Infrastructure (AMI) Networks , 2018 .

[21]  Vladimir I. Vasilyev,et al.  Immune model based approach for network intrusion detection , 2010, SIN.

[22]  Fabio A. González,et al.  The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.

[24]  Vladimir Poulkov,et al.  Multiple negative selection algorithm: Improving detection error rates in IoT intrusion detection systems , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[25]  Rozaida Ghazali,et al.  Negative Selection Algorithm: A Survey on the Epistemology of Generating Detectors , 2013, DaEng.

[26]  Kalpana Kumari,et al.  Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory , 2012 .

[27]  Krzysztof Wawryn,et al.  A Human Immunity Inspired Algorithm to Detect Infections in a Computer Program , 2019, 2019 MIXDES - 26th International Conference "Mixed Design of Integrated Circuits and Systems".

[28]  Ruirui Zhang,et al.  Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.

[29]  Abbas Jamalipour,et al.  On the negative selection and the danger theory inspired security for heterogeneous networks , 2012, IEEE Wireless Communications.

[30]  Helena Szczerbicka,et al.  ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION , 2008, Cybern. Syst..

[31]  Sung-Bae Cho,et al.  A convolutional neural-based learning classifier system for detecting database intrusion via insider attack , 2020, Inf. Sci..

[32]  Sharmila Subudhi,et al.  Application of OPTICS and ensemble learning for Database Intrusion Detection , 2019, J. King Saud Univ. Comput. Inf. Sci..

[33]  Jasvinder Pal Singh,et al.  A Review: AIS Based Intrusion Detection System , 2013 .

[34]  Xiaohua Li,et al.  An Immune Based Relational Database Intrusion Detection Algorithm , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.

[35]  A. Bakar,et al.  AN IMPROVED ARTIFICIAL DENDRITE CELL ALGORITHM FOR ABNORMAL SIGNAL DETECTION 1Mohamad , 2017 .

[36]  Suad Mohammed Othman,et al.  Survey on Intrusion Detection System Types , 2018 .

[37]  Dipankar Dasgupta,et al.  A study of artificial immune systems applied to anomaly detection , 2003 .

[38]  Sandeep K. Shukla,et al.  Verity: Blockchains to Detect Insider Attacks in DBMS , 2019, ArXiv.

[39]  Fernando P. A. Lima,et al.  Artificial Immune System with Negative Selection Applied to Facial Biometry Based on Binary Pattern Characteristics , 2019, Int. J. Artif. Intell. Tools.

[40]  Ayman Mohamed Mostafa,et al.  Securing Relational Databases with an Artificial Immunity Features , 2013 .

[41]  Pabitra Mohan Khilar,et al.  Immune Inspired Fault Diagnosis in Wireless Sensor Network , 2020 .

[42]  Tao Li,et al.  A Social Network Water Army Detection Model based on Artificial Immunity , 2019, Journal of Physics: Conference Series.

[43]  H. Veiga-Fernandes,et al.  The S(c)ensory Immune System Theory. , 2017, Trends in immunology.

[44]  Ali Selamat,et al.  A Swarm Negative Selection Algorithm for Email Spam Detection , 2015 .

[45]  Veeramreddy Jyothsna,et al.  Anomaly-Based Intrusion Detection System , 2019, Computer and Network Security.

[46]  S. Chikhi,et al.  Negative Selection Algorithm : Recent Improvements and Its Application in Intrusion Detection System , 2017 .

[47]  Ying Tan,et al.  An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization , 2010, ICSI.

[48]  Jun Fu,et al.  Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection , 2012, ICARIS.

[49]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[50]  Kui Zhang,et al.  A Danger Model Based Anomaly Detection Method for Wireless Sensor Networks , 2009, 2009 Second International Symposium on Knowledge Acquisition and Modeling.

[51]  Ayman Mohamed Mostafa,et al.  Design and implementation of multi-layer policies for database security , 2013 .

[52]  Mohammed Bouhorma,et al.  MANET security: An intrusion detection system based on the combination of Negative Selection and danger theory concepts , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).

[53]  Yonghong Chen,et al.  An Improved Dendritic Cell Algorithm Based Intrusion Detection System for Wireless Sensor Networks , 2017 .

[54]  Manuel Eduardo Correia,et al.  TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection , 2008, IWPACBB.

[55]  Xin Lin,et al.  Recent advances in clonal selection algorithms and applications , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).

[56]  Jia Chen,et al.  Definition of Danger Signal in Artificial Immune System with Cloud Method , 2008, 2008 Fourth International Conference on Natural Computation.

[57]  Peter Wlodarczak Cyber Immunity - A Bio-Inspired Cyber Defense System , 2017, IWBBIO.

[58]  Fuyong Zhang,et al.  Integrated Negative Selection Algorithm and Positive Selection Algorithm for malware detection , 2016, 2016 International Conference on Progress in Informatics and Computing (PIC).

[59]  Fang Wang,et al.  A niching negative selective genetic algorithm for self-nonself discrimination in a computer , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[60]  Ruirui Zhang,et al.  An Intrusion Detection Method Based on Changes of Antibody Concentration in Immune Response , 2019, J. Inf. Process. Syst..

[62]  Iqbal Gondal,et al.  Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.

[63]  Samuel Kounev,et al.  Efficient and Effective Ransomware Detection in Databases , 2018 .

[64]  Tao Li,et al.  A New Intrusion Detection Method Based on Antibody Concentration , 2009, ICIC.

[65]  Kamalanathan Kandasamy,et al.  Database Intrusion Detection System Using Octraplet and Machine Learning , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).

[66]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[67]  Sung-Bae Cho,et al.  Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack , 2019, HAIS.

[68]  Abdelouahid Derhab,et al.  NSNAD: negative selection-based network anomaly detection approach with relevant feature subset , 2019, Neural Computing and Applications.

[69]  Salim Chikhi,et al.  Clustered negative selection algorithm and fruit fly optimization for email spam detection , 2017, Journal of Ambient Intelligence and Humanized Computing.

[70]  Xiao Zhi Gao,et al.  Negative Selection Algorithm with Applications in Motor Fault Detection , 2008, Soft Computing Applications in Industry.

[71]  Hong Qiao,et al.  Negative selection based immune optimization , 2007, Adv. Eng. Softw..

[72]  Ruslan Medzhitov,et al.  Disease Tolerance as a Defense Strategy , 2012, Science.

[73]  Wenjian Luo,et al.  PTS-RNSA: A Novel Detector Generation Algorithm for Real-Valued Negative Selection Algorithm , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.

[74]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[75]  Shahaboddin Shamshirband,et al.  Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[76]  Virendra Barot,et al.  A framework for database intrusion detection system , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).

[77]  Jorge Bernardino,et al.  Approaches and Challenges in Database Intrusion Detection , 2014, SGMD.

[78]  Ayman Mohamed Mostafa,et al.  Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases , 2013 .

[79]  Mario Pavone,et al.  DENSA: An effective negative selection algorithm with flexible boundaries for self-space and dynamic number of detectors , 2017, Eng. Appl. Artif. Intell..

[80]  Suvasini Panigrahi,et al.  Database Intrusion Detection Using Adaptive Resonance Network Theory Model , 2020 .

[81]  A.O. Tarakanov,et al.  Immunocomputing for intelligent intrusion detection , 2008, IEEE Computational Intelligence Magazine.

[82]  Romilla Syed,et al.  Enterprise reputation threats on social media: A case of data breach framing , 2019, J. Strateg. Inf. Syst..

[83]  Yong Joon Park,et al.  Web Application Intrusion Detection System for Input Validation Attack , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[84]  Fatemeh Barani,et al.  BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms , 2012, ISC Int. J. Inf. Secur..

[85]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[86]  Murad A. Rassam,et al.  Artificial Immune Network Clustering approach for Anomaly Intrusion Detection , 2012 .

[87]  Wanli Ma,et al.  A Novel Spam Email Detection System Based on Negative Selection , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[88]  Suvasini Panigrahi,et al.  A Hybrid Database Intrusion Detection Algorithm Using Swarm Intelligence and Radial Basis Function Network , 2019, HELIX.

[89]  Wang Xiuying,et al.  A Danger-Theory-Based Abnormal Traffic Detection Model in Local Network , 2008, 2008 International Conference on Computer Science and Software Engineering.

[90]  Haidong Fu,et al.  Design of a Four-Layer Model Based on Danger Theory and AIS for IDS , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[91]  Xin Xiao,et al.  A Network Intrusion Detection Model Based on Artificial Immune , 2011 .

[92]  Nacim YANES,et al.  An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems , 2019 .

[93]  Aboul Ella Hassanien,et al.  Negative Selection Approach Application in Network Intrusion Detection Systems , 2014, ArXiv.

[94]  Alexander Krizhanovsky,et al.  An Approach for Adaptive Intrusion Prevention Based on The Danger , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[95]  Elisa Bertino,et al.  Techniques and Systems for Anomaly Detection in Database Systems , 2018, PADG@ESORICS.

[96]  Xufei Zheng,et al.  The dual negative selection algorithm and its application for network anomaly detection , 2017, Int. J. Inf. Commun. Technol..

[97]  Wanli Ma,et al.  Negative Selection as a Means of Discovering Unknown Temporal Patterns , 2010 .

[98]  Marin Emilov Pamukov,et al.  Negative Selection and Neural Network Based Algorithm for Intrusion Detection in IoT , 2018, 2018 41st International Conference on Telecommunications and Signal Processing (TSP).

[99]  Hao Jiang,et al.  Three Branches of Negative Representation of Information: A Survey , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[100]  Raed A. Alsaqour,et al.  Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET , 2011, ICSECS.

[101]  S Arannya Applications of Artificial Immune System: A Review , 2015, FOCS 2015.

[102]  Inadyuti Dutt,et al.  Survey of Bio-Inspired Techniques based on System Resource Usage in Intrusion Detection , 2020 .

[103]  Yonghong Chen,et al.  DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP , 2017, KSII Trans. Internet Inf. Syst..

[104]  Mário M. Freire,et al.  Applications of artificial immune systems to computer security: A survey , 2017, J. Inf. Secur. Appl..

[105]  Simon N. Foley,et al.  Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[106]  Fang Liu,et al.  Intrusion Detection Based on Immune Clonal Selection Algorithms , 2004, Australian Conference on Artificial Intelligence.

[107]  Tao Li,et al.  A real negative selection algorithm with evolutionary preference for anomaly detection , 2017 .

[108]  Bharanidharan Shanmugam,et al.  An Intelligent Spam Detection Model Based on Artificial Immune System , 2019, Inf..

[109]  Alexander O. Tarakanov,et al.  Immunocomputing Model of Intrusion Detection , 2003, MMM-ACNS.

[110]  Sung-Bae Cho,et al.  CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model , 2019, ICONIP.

[111]  Alireza Osareh,et al.  Distribution estimation based negative selection algorithm (DENSA) , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).

[112]  Julie Greensmith,et al.  Sensing Danger: Innate Immunology for Intrusion Detection , 2007, Inf. Secur. Tech. Rep..

[113]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[114]  Sung-Bae Cho,et al.  Applying accuracy-based LCS to detecting anomalous database access , 2018, GECCO.

[115]  Xiaohong Yuan,et al.  Applying Artificial Immune System for Intrusion Detection , 2018, 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService).

[116]  Min Hu,et al.  A Novel Negative Selection Algorithm for Recognition Problems , 2015 .

[117]  Lin Jia,et al.  Negative Selection Algorithm Based on Antigen Density Clustering , 2020, IEEE Access.

[118]  Manuel Eduardo Correia,et al.  Towards an Immune-inspired Temporal Anomaly Detection Algorithm based on Tunable Activation Thresholds , 2009, BIOSIGNALS.

[119]  Tao Li,et al.  Augmented Negative Selection Algorithm with Complete Random Subspace Technique for Anomaly Detection , 2019, 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT).

[120]  Leandro Nunes de Castro,et al.  Fundamentals of natural computing: an overview , 2007 .

[121]  Samuel Kounev,et al.  Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences , 2019, ArXiv.

[122]  Alireza Nowroozi,et al.  A New Intrusion Detection System using the Improved Dendritic Cell Algorithm , 2020, Comput. J..

[123]  Sarita Singh Bhadauria,et al.  Intrusion Detection Using Negative Selection Based Neural Network Algorithm , 2019 .

[124]  Daniyal M. Alghazzawi,et al.  Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research , 2020, J. Netw. Comput. Appl..

[125]  Wan Tang,et al.  Avidity-model based clonal selection algorithm for network intrusion detection , 2010, 2010 IEEE 18th International Workshop on Quality of Service (IWQoS).

[126]  Muhammad Zeeshan,et al.  An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[127]  Simon N. Foley,et al.  A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems , 2017, CRiSIS.

[128]  Jing Zhang,et al.  A Novel Multi-layered Immune Network Intrusion Detection Defense Model: MINID , 2013, J. Networks.

[129]  Karim Abouelmehdi,et al.  A survey of intrusion detection system , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).

[130]  Paulo B. Lourenço,et al.  Deterministically generated negative selection algorithm for damage detection in civil engineering systems , 2019, Engineering Structures.

[131]  Manuel Eduardo Correia,et al.  Self Tolerance by Tuning T-Cell Activation: An Artificial Immune System for Anomaly Detection , 2010, BIONETICS.

[132]  Mohammed Tarique,et al.  Detection of SQL Injection Attacks: A Machine Learning Approach , 2019, 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA).

[133]  Honghua Dai,et al.  An Extended Negative Selection Algorithm for Anomaly Detection , 2004, PAKDD.

[134]  Ling-Xi Peng,et al.  Automated Intrusion Response System Algorithm with Danger Theory , 2014, 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[135]  Thomas Stibor,et al.  On the appropriateness of negative selection for anomaly detection and network intrusion detection , 2006 .

[136]  S. Janakiraman,et al.  An Intrusion Detection and Prevention System Using AIS—An NK Cell-Based Approach , 2018 .

[137]  Manuel Eduardo Correia,et al.  Tunable Immune Detectors for Behaviour-Based Network Intrusion Detection , 2011, ICARIS.

[138]  Kamalrulnizam Abu Bakar,et al.  Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[139]  M. Antunes,et al.  Temporal anomaly detection: an artificial immune approach based on T cell activation, clonal size regulation and homeostasis. , 2010, Advances in experimental medicine and biology.

[140]  É. Vivier,et al.  The discontinuity theory of immunity , 2016, Science Immunology.

[141]  Tuan Dinh Le,et al.  A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection , 2014, FDSE.

[142]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[143]  Dipankar Dasgupta,et al.  A biologically inspired password authentication system , 2009, CSIIRW '09.

[144]  Mehmet Güçlü,et al.  Comparisons on Intrusion Detection and Prevention Systems in Distributed Databases , 2019 .

[145]  Swati Baburao Wankar Implementation of Log Mining and Forensic Analysis for Database Intrusion Detection and Protection System , 2018 .

[146]  Longzhi Yang,et al.  Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection , 2019, 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[147]  Na Wang,et al.  Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[148]  Suvasini Panigrahi,et al.  Application of Deep Learning for Database Intrusion Detection , 2020 .

[149]  Florin Popentiu Vladicescu,et al.  Recent Advances in Artificial Immune Systems: Models, Algorithms, and Applications , 2017 .

[150]  David Brosset,et al.  A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets , 2018, ArXiv.

[151]  H. Dai,et al.  Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.

[152]  Li Ma,et al.  An Improved Dynamic Clonal Selection Algorithm Using Network Intrusion Detection , 2018, 2018 14th International Conference on Computational Intelligence and Security (CIS).

[153]  Richa Adlakha,et al.  Cyber Security Goal’s, Issue’s, Categorization & Data Breaches , 2019, 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon).

[154]  Xufei Zheng,et al.  Principle and Application of Dendritic Cell Algorithm for Intrusion Detection , .

[155]  Tony White,et al.  Developing an Immunity to Spam , 2003, GECCO.

[156]  Behnam S. Arad,et al.  Customized Intrusion Detection Based on a Database Audit Log , 2019, CATA.

[157]  Jianhua Guo,et al.  Collaborative RFID intrusion detection with an artificial immune system , 2011, Journal of Intelligent Information Systems.

[158]  Zhengjun Liu,et al.  An Improved Negative Selection Algorithm Based on Subspace Density Seeking , 2017, IEEE Access.

[159]  Li Tao,et al.  A method inspired from differential coefficient for calculating danger signals in Artificial Immune System , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).

[160]  Zhi Gang Wu,et al.  Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness , 2011 .

[161]  Hirotada Ohashi,et al.  A negative selection algorithm for classification and reduction of the noise effect , 2009, Appl. Soft Comput..

[162]  Reza Azmi,et al.  MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..

[163]  He Yang,et al.  Method for Presenting Danger Signals Based on System Balance , 2015 .

[164]  Suhair Amer,et al.  Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems That Uses Exact Graphs , 2015, 2015 International Conference on Computational Science and Computational Intelligence (CSCI).

[165]  Lars Mathiassen,et al.  Data Breach Risks and Resolutions: A Literature Synthesis , 2019, AMCIS.

[166]  Ayman Mohamed Mostafa,et al.  Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).

[167]  Fabio A. González,et al.  A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.

[168]  Suvasini Panigrahi,et al.  Role of Soft Outlier Analysis in Database Intrusion Detection , 2020 .

[169]  Ranjit Singh,et al.  False Positive Analysis of Software Vulnerabilities Using Machine Learning , 2018, 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[170]  Raji Ramachandran,et al.  Anomaly Detection in Role Administered Relational Databases — A Novel Method , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[171]  Anazida Zainal,et al.  Intrusion Detection System Using Unsupervised Immune Network Clustering with Reduced Features , 2010, SOCO 2010.

[172]  Rajni Jindal,et al.  A survey on database intrusion detection: approaches, challenges and application , 2019 .

[173]  Dong Li,et al.  Negative selection algorithm with constant detectors for anomaly detection , 2015, Appl. Soft Comput..

[174]  Bernardete Ribeiro,et al.  A Hybrid AIS-SVM Ensemble Approach for Text Classification , 2011, ICANNGA.

[175]  Chenggong Zhang,et al.  A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem , 2010, Neurocomputing.

[176]  Fengqi Yu,et al.  Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[177]  Gang Chen,et al.  An Immunity-Based Intrusion Detection Solution for Database Systems , 2005, WAIM.

[178]  Julie Greensmith,et al.  Detecting Danger: The Dendritic Cell Algorithm , 2010, ArXiv.

[179]  Tarek N. Saadawi,et al.  Detecting Denial of Service Attacks Using a Combination of Dendritic Cell Algorithm and the Negative Selection Algorithm , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).

[180]  Ali Selamat,et al.  Negative selection algorithm in artificial immune system for spam detection , 2011, 2011 Malaysian Conference in Software Engineering.

[181]  Vishwa Teja Alaparthy,et al.  A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory , 2018, IEEE Access.

[182]  Jonathan Timmis,et al.  Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.

[183]  Javaid Iqbal,et al.  Artificial Immune System–Negative Selection Classification Algorithm (NSCA) for Four Class Electroencephalogram (EEG) Signals , 2018, Front. Hum. Neurosci..

[184]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[185]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.