An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems

The immune system has received a special attention as a potential source of inspiration for innovative approaches to solve database security issues and build artificial immune systems. Database security issues need to be correctly identified to ensure that suitable responses are taken. This paper proposes an immunity-based error containment algorithm for providing optimum response in detected intrusions. The objective of the proposed algorithm is to reduce the false positive alarms to the minimum since not all the incidents are malicious in nature. The proposed algorithm is based on apoptotic and necrotic signals which are parts of the immunity structure in human immune system. Apoptotic signals define low-level alerts that could result from legitimate users but could be also the prerequisites for an attack, while necrotic signals define high-level alerts that result from actual successful attacks.

[1]  Kamalrulnizam Abu Bakar,et al.  Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[2]  Mohd Fadzil Hassan,et al.  Data hibernation framework in workflows under intrusion threat , 2011, 2011 IEEE Symposium on Computers & Informatics.

[3]  Ayman Mohamed Mostafa,et al.  Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases , 2013 .

[4]  Wang Huijie A Security Framework for Database Auditing System , 2017, 2017 10th International Symposium on Computational Intelligence and Design (ISCID).

[5]  Sugata Sanyal,et al.  Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[6]  A.R. Hamdan,et al.  Classifying heterogeneous data with Artificial Immune System , 2008, 2008 International Symposium on Information Technology.

[7]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[8]  Ayman Mohamed Mostafa,et al.  Design and implementation of multi-layer policies for database security , 2013 .

[9]  Gerome Miklau,et al.  Auditing a Database under Retention Restrictions , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[10]  Zhilei Cui,et al.  Adaptive Intrusion Tolerance Strategy of the System Based on Artificial Immune , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[11]  Chung-Ming Ou,et al.  Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.

[12]  Azmi Jaafar,et al.  Immune Systems Approaches for Cryptographic Algorithm , 2011, 2011 Sixth International Conference on Bio-Inspired Computing: Theories and Applications.

[13]  Mário M. Freire,et al.  Applications of artificial immune systems to computer security: A survey , 2017, J. Inf. Secur. Appl..

[14]  Kehe Wu,et al.  The design and implementation of database audit system framework , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.

[15]  Qiang Huang,et al.  A Logging Scheme for Database Audit , 2009, 2009 Second International Workshop on Computer Science and Engineering.

[16]  Asim A. Elshiekh,et al.  Three Audit Stages for Securing Statistical Databases , 2009, 2009 International Conference on Information Management and Engineering.

[18]  Ayman Mohamed Mostafa,et al.  Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).

[19]  Han Dong,et al.  A novel generalized framework for access control based on the immune mechanism , 2008, 2008 7th World Congress on Intelligent Control and Automation.

[20]  Gang Chen,et al.  An Immunity-Based Intrusion Detection Solution for Database Systems , 2005, WAIM.

[21]  Yunpeng Li,et al.  An Audit Method Based on Mathematical Statistics Detection in Database Audit System , 2015 .