Survey Analysis on Immunological Approach to Intrusion Detection

This paper evaluates the correlation between the immune system of human and systems which detects intrusion. Intrusion is an unofficial and not permitted access or action in a computer system. For detection of any of these malicious activities and for security of our computer systems, Intrusion detection technologies are becoming extremely important. The paper initiates by introducing intrusion detection systems and its types. An outline of the immune system of human is presented and the prominent features which are beneficial to the design of Intrusion detection system are analyzed. Researchers are always inspired by environment. Security of computer is no exclusion. Artificial Immune system provoked from Natural Immune system works proficiently for detecting any outer threat in a network. Human body provides two levels of defense against any foreign body. The primary layer of defense is Innate Immune system and the secondary is Adaptive Immune system.

[1]  Lui Sha,et al.  Memory Heat Map: Anomaly detection in real-time embedded systems using memory behavior , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[2]  Julie Greensmith,et al.  Dendritic cells for SYN scan detection , 2007, GECCO '07.

[3]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[4]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[5]  Feng Wang,et al.  A Survey of Artificial Immune System Based Intrusion Detection , 2014, TheScientificWorldJournal.

[6]  Sureswaran Ramadass,et al.  Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System , 2013 .

[7]  Carlos García Garino,et al.  Automatic network intrusion detection: Current techniques and open issues , 2012, Comput. Electr. Eng..

[8]  Uwe Aickelin,et al.  An Immune Inspired Approach to Anomaly Detection , 2009, ArXiv.

[9]  Inadyuti Dutt,et al.  Intrusion Detection System using Artificial Immune System , 2016 .

[10]  Julie Greensmith,et al.  Dendritic Cells for Real-Time Anomaly Detection , 2010, ArXiv.

[11]  Chung-Ming Ou,et al.  Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.

[12]  Tarek S. Sobh,et al.  A cooperative immunological approach for detecting network anomaly , 2011, Appl. Soft Comput..

[13]  Peter J. Bentley,et al.  The Artificial Immune System for Network Intrusion Detection : An Investigation of Clonal Selection with a Negative Selection Operator , 2001 .

[14]  Graham Kendall,et al.  Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques , 2013 .

[15]  Sugata Sanyal,et al.  A Multi-Dimensional approach towards Intrusion Detection System , 2012, ArXiv.

[16]  Uwe Aickelin,et al.  Detecting Anomalous Process Behaviour Using Second Generation Artificial Immune Systems , 2010, Int. J. Unconv. Comput..

[17]  Senhua Yu,et al.  MILA – multilevel immune learning algorithm and its application to anomaly detection , 2005, Soft Comput..

[18]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.