Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System

With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection Systems (IDS). Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. Because of its unique features, (self-learning, self-adaptation and selfimprovement), AIS has been utilized to design new anomaly base IDS. In this paper we have introduced a new distributed, agent based design of AIS based IDS. In our model detectors are distributed in each host in network while the central engine is located in server which manages the detectors and make final decision about current intrusion based on previous experience of all of the hosts in network. In our purposed model detector agents in each host is actively updated and synchronized with detector agents of other hosts through our IDS’s central engine.

[1]  Sugata Sanyal,et al.  Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[2]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[4]  Yi Guan,et al.  Multi-word-Agent Autonomy Learning Based on Adaptive Immune Theories , 2013 .

[5]  Ki-Won Yeom,et al.  An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.

[6]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[7]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[8]  Chen Guoqiang,et al.  Community Detection in Complex Networks Using Immune Clone Selection Algorithm , 2011 .

[9]  Feixian Sun,et al.  Research of Immunity-based Anomaly Intrusion Detection and Its Application for Security Evaluation of E-government Affair Systems , 2012 .

[10]  Jonathan Timmis,et al.  Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..

[11]  Farhoud Hosseinpour,et al.  Design of a new distributed model for Intrusion Detection System based on Artificial Immune System , 2010, 2010 6th International Conference on Advanced Information Management and Service (IMS).

[12]  Haidong Fu,et al.  Design of a Four-Layer Model Based on Danger Theory and AIS for IDS , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Zhiguo Zhao,et al.  An artificial immunity-based proactive defense system , 2007, 2007 IEEE International Conference on Robotics and Biomimetics (ROBIO).

[14]  Peter Braun,et al.  Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .

[15]  Robert L. Fanelli A Hybrid Model for Immune Inspired Network Intrusion Detection , 2008, ICARIS.

[16]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[17]  Chung-Ming Ou,et al.  Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory , 2009, KES-AMSTA.

[18]  Kamalrulnizam Abu Bakar,et al.  Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[19]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[20]  Thomas Stibor,et al.  Foundations of r-contiguous matching in negative selection for anomaly detection , 2009, Natural Computing.

[21]  F. Azuaje Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[22]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[23]  Tao Li,et al.  Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..