Network Immunity: What can we learn from nature for network protection?

In this paper we analyze network immunity as a bio-inspired approach for detecting anomalies in communication networks. We briefly review the basic methods of artificial immune systems (AIS), identify their strengths and weaknesses, and evaluate their possible applications to intrusion detection in computer networks. After an overview of related work from the area of intrusion detection we collect key challenges anticipated for the realization of network immunity based on AIS.

[1]  Hartmut Pohl Zur Technik der heimlichen Online-Durchsuchung , 2007, Datenschutz und Datensicherheit - DuD.

[2]  Sushil Jajodia,et al.  Abstraction-based intrusion detection in distributed environments , 2001, TSEC.

[3]  Elias Levy Criminals Become Tech Savvy , 2004, IEEE Secur. Priv..

[4]  Simon M. Garrett,et al.  How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.

[5]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[6]  Christos Douligeris,et al.  Network Security , 2005 .

[7]  Shian-Shyong Tseng,et al.  A study of alert-based collaborative defense , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[8]  Frédéric Cuppens,et al.  Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[9]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[10]  Biswanath Mukherjee,et al.  DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .

[11]  Sushil Jajodia,et al.  CARDS: A Distributed System for Detecting Coordinated Attacks , 2000, SEC.

[12]  Giovanni Vigna,et al.  NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..

[13]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[14]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[15]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  Fabio A. González,et al.  A comparative analysis of artificial immune network models , 2005, GECCO '05.