Abstract
The widespread use of internet in key areas has increased unauthorized attacks in the network. Intrusion detection and prevention system detects as well as prevents the attacks on confidentiality, integrity, and availability of the system. In this paper, an Artificial Immune System based intrusion detection and prevention system is designed using artificial Natural Killer (NK) cells. Random NK cells are generated and negative selection algorithm is applied to eliminate self-identifying cells. These cells detect attacks on the network. High health value cells that detect a large number of attacks are proliferated into the network. When the proliferation reaches a threshold, the NK cells are migrated into the intrusion prevention system. So NK cells in IDS are in promiscuous mode and NK cells in IPS are in inline mode. The technique yields high detection rate, better accuracy and low response time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Anderson JP (1980) Computer security threat monitoring and surveillance. Washing, PA, James P. Anderson Co
Denning DE (1986) An intrusion detection model. In: Proceedings of the seventh IEEE symposium on security and privacy
Forrest S, Hofmeyr SA, Somayaji A (1997) Computer Immunology. Commun ACM 40(10):88–96
Forrest S, Pereslon AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proceedings of the 1992 IEEE symposium on security and privacy. IEEE Computer Society Press, pp 202–212
Burnet FM (1959) The clonal selection theory of acquired immunity. Vanderbilt University Press, USA
de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6:239–251
Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305
Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel Immune-Inspired algorithm for anomaly detection. Lecture Notes in Computer science, 3627. Springer, Berlin, Heidelberg
Jerne NK (1974) Towards a network theory of the immune system. Ann Immunol (Inst Pasteur) 125C:373–389
Hu X, Liu X, Li T, Yang T, Chen W, Liu Z (2015) Dynamically real-time intrusion detection algorithm with immune network. J Comput Inf Syst 11:587–594
Afzali Seresht N, Azmi R (2014) MAIS-IDS: a distributed intrusion detection system using multi-agent AIS approach. Eng Appl Artif Intell 35:286–298
Fu J, Yang H, Liang Y, Tan C (2012) Bait a trap: introducing natural killer cells to artificial immune system for spyware detection. Lecture Notes Computer Science (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 7597. LNCS, pp 125–138
Ou CM (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86
Yang J, Liu X, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowl-Based Syst 22:115–119
Zhang P, Tan Y (2015) Immune cooperation mechanism based learning framework. Neurocomputing 148:158–166
Sobh TS, Mostafa WM (2011) A cooperative immunological approach for detecting network anomaly. Appl Soft Comput J 11:1275–1283
Laurentys CA, Ronacher G, Palhares RM, Caminhas WM (2010) Design of an artificial immune system for fault detection: a negative selection approach. Expert Syst Appl 37:5507–5513
Janakiraman S, Vasudevan V (2009) Agent-based DIDS: a intelligent learning approach. Int J Intell Inf Process 8. Serials Publications
Bejoy BJ, Janakiraman S (2017) Artificial immune system based intrusion detection systems—a comprehensive review. Int J Comput Eng Technol 8(1):85–95
Arina A, Murillo O, Dubrot J, Azpilikueta A, Alfaro C, PÃrez-Gracia JL, Bendandi M, Palencia B, Hervás-Stubbs S, Melero I (2007) Cellular liaisons of natural killer lymphocytes in immunology and immunotherapy of cancer. Expert Opin Biol Ther 7(5):599–615
NSL KDD CUP 99 Dataset. http://nsl.cs.unb.ca/NSL-KDD
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Bejoy, B.J., Janakiraman, S. (2019). An Intrusion Detection and Prevention System Using AIS—An NK Cell-Based Approach. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_86
Download citation
DOI: https://doi.org/10.1007/978-3-030-00665-5_86
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00664-8
Online ISBN: 978-3-030-00665-5
eBook Packages: EngineeringEngineering (R0)