Securing Relational Databases with an Artificial Immunity Features

Database security is considered one of the major computer science research trends because of its importance in maintaining the privacy, integrity, and confidentiality of data. Human immune system is a set of defense mechanisms that can be used to defend the body against diseases caused by pathogens. Artificial immune system is the artificial simulation of human immunity that can be applied to computer security applications. The main goal of this paper is to develop a database security system based on danger theory. Danger theory is one of the most recent algorithms of artificial immunity that can provide interactive features for securing relational databases. By merging the developed features of artificial immunity to the security system, the secrecy of the database can be maintained.

[1]  Ayman Mohamed Mostafa,et al.  Design and implementation of multi-layer policies for database security , 2013 .

[2]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Xin Wang,et al.  A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for Each Detector , 2006, PPSN.

[4]  Ayman Mohamed Mostafa,et al.  Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).

[5]  Kamalrulnizam Abu Bakar,et al.  Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[6]  Salah Al-Sharhan,et al.  ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .

[7]  Ayman Mohamed Mostafa,et al.  Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases , 2013 .

[8]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[9]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[10]  Wenjian Luo,et al.  On convergence of Evolutionary Negative Selection Algorithms for anomaly detection , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).

[11]  Chung-Ming Ou,et al.  Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.

[12]  Fernando José Von Zuben,et al.  omni-aiNet: An Immune-Inspired Approach for Omni Optimization , 2006, ICARIS.

[13]  Chenggong Zhang,et al.  An Artificial Immune Network Model Applied to Data Clustering and Classification , 2007, ISNN.

[14]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[15]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[16]  J Timmis,et al.  An artificial immune system for data analysis. , 2000, Bio Systems.

[17]  Jiqiang Zhai,et al.  Design and Implementation , 2011 .