Skip to main content

An Intrusion Detection and Prevention System Using AIS—An NK Cell-Based Approach

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computational Vision and Biomechanics ((LNCVB,volume 30))

Abstract

The widespread use of internet in key areas has increased unauthorized attacks in the network. Intrusion detection and prevention system detects as well as prevents the attacks on confidentiality, integrity, and availability of the system. In this paper, an Artificial Immune System based intrusion detection and prevention system is designed using artificial Natural Killer (NK) cells. Random NK cells are generated and negative selection algorithm is applied to eliminate self-identifying cells. These cells detect attacks on the network. High health value cells that detect a large number of attacks are proliferated into the network. When the proliferation reaches a threshold, the NK cells are migrated into the intrusion prevention system. So NK cells in IDS are in promiscuous mode and NK cells in IPS are in inline mode. The technique yields high detection rate, better accuracy and low response time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Anderson JP (1980) Computer security threat monitoring and surveillance. Washing, PA, James P. Anderson Co

    Google Scholar 

  2. Denning DE (1986) An intrusion detection model. In: Proceedings of the seventh IEEE symposium on security and privacy

    Google Scholar 

  3. Forrest S, Hofmeyr SA, Somayaji A (1997) Computer Immunology. Commun ACM 40(10):88–96

    Article  Google Scholar 

  4. Forrest S, Pereslon AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proceedings of the 1992 IEEE symposium on security and privacy. IEEE Computer Society Press, pp 202–212

    Google Scholar 

  5. Burnet FM (1959) The clonal selection theory of acquired immunity. Vanderbilt University Press, USA

    Google Scholar 

  6. de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6:239–251

    Article  Google Scholar 

  7. Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305

    Article  Google Scholar 

  8. Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel Immune-Inspired algorithm for anomaly detection. Lecture Notes in Computer science, 3627. Springer, Berlin, Heidelberg

    Google Scholar 

  9. Jerne NK (1974) Towards a network theory of the immune system. Ann Immunol (Inst Pasteur) 125C:373–389

    Google Scholar 

  10. Hu X, Liu X, Li T, Yang T, Chen W, Liu Z (2015) Dynamically real-time intrusion detection algorithm with immune network. J Comput Inf Syst 11:587–594

    Google Scholar 

  11. Afzali Seresht N, Azmi R (2014) MAIS-IDS: a distributed intrusion detection system using multi-agent AIS approach. Eng Appl Artif Intell 35:286–298

    Article  Google Scholar 

  12. Fu J, Yang H, Liang Y, Tan C (2012) Bait a trap: introducing natural killer cells to artificial immune system for spyware detection. Lecture Notes Computer Science (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 7597. LNCS, pp 125–138

    Google Scholar 

  13. Ou CM (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86

    Article  Google Scholar 

  14. Yang J, Liu X, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowl-Based Syst 22:115–119

    Article  Google Scholar 

  15. Zhang P, Tan Y (2015) Immune cooperation mechanism based learning framework. Neurocomputing 148:158–166

    Article  Google Scholar 

  16. Sobh TS, Mostafa WM (2011) A cooperative immunological approach for detecting network anomaly. Appl Soft Comput J 11:1275–1283

    Article  Google Scholar 

  17. Laurentys CA, Ronacher G, Palhares RM, Caminhas WM (2010) Design of an artificial immune system for fault detection: a negative selection approach. Expert Syst Appl 37:5507–5513

    Article  Google Scholar 

  18. Janakiraman S, Vasudevan V (2009) Agent-based DIDS: a intelligent learning approach. Int J Intell Inf Process 8. Serials Publications

    Google Scholar 

  19. Bejoy BJ, Janakiraman S (2017) Artificial immune system based intrusion detection systems—a comprehensive review. Int J Comput Eng Technol 8(1):85–95

    Google Scholar 

  20. Arina A, Murillo O, Dubrot J, Azpilikueta A, Alfaro C, PÃrez-Gracia JL, Bendandi M, Palencia B, Hervás-Stubbs S, Melero I (2007) Cellular liaisons of natural killer lymphocytes in immunology and immunotherapy of cancer. Expert Opin Biol Ther 7(5):599–615

    Article  Google Scholar 

  21. NSL KDD CUP 99 Dataset. http://nsl.cs.unb.ca/NSL-KDD

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. J. Bejoy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bejoy, B.J., Janakiraman, S. (2019). An Intrusion Detection and Prevention System Using AIS—An NK Cell-Based Approach. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00665-5_86

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00664-8

  • Online ISBN: 978-3-030-00665-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics