Call for Paper - February 2021 Edition
IJCA solicits original research papers for the February 2021 Edition. Last date of manuscript submission is January 20, 2021. Read More

Intrusion Detection System using Artificial Immune System

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Inadyuti Dutt, Samarjeet Borah, Indrakanta Maitra

Inadyuti Dutt, Samarjeet Borah and Indrakanta Maitra. Intrusion Detection System using Artificial Immune System. International Journal of Computer Applications 144(12):19-22, June 2016. BibTeX

	author = {Inadyuti Dutt and Samarjeet Borah and Indrakanta Maitra},
	title = {Intrusion Detection System using Artificial Immune System},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {144},
	number = {12},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {19-22},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2016910496},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Nature and natural organisms have always inspired researchers and scientists for solving real world issues. And Computer security is no exception. Artificial Immune System inspired from natural Immune System works efficiently for detecting intrusion in a network. Two layers of defenses: innate system and adaptive system are implemented in this proposed methodology where the innate system mimics the natural Innate Immune System to form the first line of defense. The adaptive system imitates the Adaptive Immune System by incorporating the T-cell and B-cell defensive mechanisms. The results exhibit that the proposed methodology works efficiently for detecting intrusion after inducing malicious attacks on the network system.


  1. S Forrest, SA Hofmeyr, A Somayaji, 1997 Computer Immunology Communications of the ACM, Vol. 40, Issue 10, 88-96.
  2. D. Dasgupta, 2007 “Immuno-inspired autonomic system for cyber defense”, Information Security, Tech. Rep., Volume 12, Issue 4, pp. 235-241.
  3. Jamie Twycross, Uwe Aickelin, 2008 “An Immune- Inspired Approach to Anomaly Detection”, Handbook of Research on Information Security and Assurance, Information Science Reference, Hershey, New York.
  4. Jamie Twycross, Uwe Aickelin, Amanda Whitbrook, 2010 “Detecting Anomalous Process Behaviour using Second Generation Artificial Immune”, International Journal for Unconventional Comp., Volume 6, Issue 3–4, pp. 301–326.
  5. Tarek S. Sobha, Wael M. Mostafab, 2011 “A Cooperative Immunological Approach for Detecting Network Anomaly”, Applied Soft Computing, , Volume 11, pp. 1275–1283.
  6. Carlos A. Catania, Carlos García Garino, 2012 “Automatic Network Intrusion Detection: Current techniques and open issues”, Elsevier, Computers & Electrical Engineering, Volume 38, Issue 5, Pages 1062–1072.
  7. Chung-Ming Ou, 2012 “Host-based Intrusion Detection Systems adapted from Agent-based Artificial Immune Systems”, Neurocomputing, Volume 88, pp. 78–86.
  8. Manoj Rameshchandra Thakur, Sugata Sanyal, 2012 “A Multi-Dimensional approach towards Intrusion Detection System”, International Journal of Computer Applications (0975 – 888), Volume 48, Issue 5.
  9. U. Aickelin, D. Dasgupta, 2014 Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, Artificial Immune Systems, Chapter 13, pp. 1-29.
  10. Man-Ki Yoon, Sibin Mohany, Jaesik Choiz, and Lui Sha, 2015 “Memory Heat Map: Anomaly Detection in Real-Time Embedded Systems Using Memory Behavior”, DAC ’15, ACM Digital Library, ISBN: 978-1-4503-3520-1.
  11. Farhoud Hosseinpour, Sureswaran Ramadass, Andrew Meulenberg, Payam Vahdani Amoli and Zahra Moghaddasi, 2013 “Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System”, International Journal of Digital Content Technology and its Applications (JDCTA), Volume 7, Number 9.
  12. Meng-Hui Chen, pei-ChannChang, Jheng-LongWu, 2016 “A Population-based Incremental Learning Approach with Artificial Immune System for Network Intrusion Detection”, Engineering Applications of Artificial Intelligence”, (51)171–181.


Intrusion Detection System (IDS), Immune System (IS), Artificial Immune System (AIS)