Design of a new distributed model for Intrusion Detection System based on Artificial Immune System

Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection Systems (IDS). Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. The unique features AIS encourage the researchers to employ this techniques in variety of applications and especially in intrusion detection systems. Proper IDS design is essential to improve the performance of the IDS. The centralized design of this IDS has disadvantage of central processing for massive processes for each packets passing trough network. In this paper we proposed a distributed multi-layerd framework to enhance the detection performance and efficiency of this IDS. In our design the genetic algorithm is used for enhancing the secondary immune response. The fundamental design of our proposed AIS based IDS consists of 2 main components: IDS central engine and detection sensors. Each of these components is composed of some agents which correlate with each other in order to detect the anomalies and intrusions. Our design goal is to decrease the detection time for each connection by distributing the detectors to each host.

[1]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[2]  F. Azuaje Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[3]  Ki-Won Yeom,et al.  An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.

[4]  Thomas Stibor,et al.  Foundations of r-contiguous matching in negative selection for anomaly detection , 2009, Natural Computing.

[5]  Tao Li,et al.  Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..

[6]  Robert L. Fanelli A Hybrid Model for Immune Inspired Network Intrusion Detection , 2008, ICARIS.

[7]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[8]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  Zhiguo Zhao,et al.  An artificial immunity-based proactive defense system , 2007, 2007 IEEE International Conference on Robotics and Biomimetics (ROBIO).

[10]  Chung-Ming Ou,et al.  Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory , 2009, KES-AMSTA.

[11]  Haidong Fu,et al.  Design of a Four-Layer Model Based on Danger Theory and AIS for IDS , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[12]  Jonathan Timmis,et al.  Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..

[13]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[14]  P. Matzinger,et al.  Essay 1: The Danger Model in Its Historical Context , 2001, Scandinavian journal of immunology.

[15]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[16]  Sugata Sanyal,et al.  Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[17]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[18]  Kamalrulnizam Abu Bakar,et al.  Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.