CFP last date
20 May 2024
Reseach Article

A Review on Intrusion Detection System based on Artificial Immune System

by Pavitra Chauhan, Nikita Singh, Nidhi Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 20
Year of Publication: 2013
Authors: Pavitra Chauhan, Nikita Singh, Nidhi Chandra
10.5120/10585-5745

Pavitra Chauhan, Nikita Singh, Nidhi Chandra . A Review on Intrusion Detection System based on Artificial Immune System. International Journal of Computer Applications. 63, 20 ( February 2013), 36-40. DOI=10.5120/10585-5745

@article{ 10.5120/10585-5745,
author = { Pavitra Chauhan, Nikita Singh, Nidhi Chandra },
title = { A Review on Intrusion Detection System based on Artificial Immune System },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 20 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number20/10585-5745/ },
doi = { 10.5120/10585-5745 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:54.511528+05:30
%A Pavitra Chauhan
%A Nikita Singh
%A Nidhi Chandra
%T A Review on Intrusion Detection System based on Artificial Immune System
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 20
%P 36-40
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Various approaches from different fields have been proposed to improve the security of computer system. One such approach is Intrusion detection system monitors computer system in real-time for activities indicating attempted or actual access by unauthorised users. To build an effective intrusion detection system many techniques are available which gathers and analyze information from different areas within a computer system or network and identify various security threats, including both intrusions anomaly i. e. attacks from outside the organization and misuse i. e. attacks from within the organization. Artificial Immune System (AIS) which is inspired by the robust and flexible nature of Human Immune System (HIS) can be incorporated in current Intrusion Detection Systems (IDS) thereby improving their efficiency and performance. This paper gives a review of various artificial immune system approaches that can be used for the development of an Intrusion Detection System.

References
  1. Anderson, J. P. , 1980. Computer Security and Threat Monitoring Surveillance. Technical report at Co. Fort Washington Pennsylvania.
  2. Denning, D. 1987. An Intrusion Detection Model. IEEE Transactions on Software Engineering.
  3. Einwechter, N. An introduction to Distributed Intrusion Detection System. Information available via www. semantic. com
  4. Daniel B. Cid, Rossi, J. , Starks, D. P. M. , Scott, R. S. OSSEC (Open Source Host-based Intrusion Detection System) http://www. ossec. net
  5. Real Secure Server Sensor tool information available via www at http://www-03. ibm. com/systems/power/software/aix/security/solutions/iss. html.
  6. Roeasch, M. (Chief Technology Officer). Snort (open source network intrusion prevention and detection system (IDS/IPS). http://snort. org/
  7. Hosmer, C. (President and CEO of WetStone). SMART Watch (HIDS Tool). http://www. linuxsecurity. com/content/view/107779/169/-9
  8. OSSIM tool information available via www at http://sectools. org/tool/ossim/
  9. Vigna, Kruegel, C. 2005. Host-based Intrusion Detection System. In the handbook of Information Security. Volume II John Wiley & sons. -10
  10. Immune System information available via www at http://pathmicro. med. sc. edu/ghaffar/innate. htm
  11. Zheng, H. , Zhang, J. , Nahavandi, S. 2004. Learning to detect texture objects by artificial immune approaches. Future Generation Computer System. Volume 20.
  12. Anup, K. , Schwartzbard, A. A study in Neural Network for Anomaly and misuse Detection. A DARPA funded paper.
  13. Hofmyer, A. , Forrest, S. 2000. Immunity by design: An artificial Immune System. Department of Computer science. University of Mexico.
  14. Kim, J. , Bently, P. J. 2001. An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection. In Proceedings of the Genetic and Evolutionary Computation conference.
  15. Sergio de paula, F. , Numes de cast ro, L. , Licio de gues, P. 2004. An Intrusion Detection system using ideas from Artificial Immune System. In the proceedings of IEEE.
  16. Ying, L. , Yan, Z. , Yang-Jia, O. 2010. The Design and Implementation of Host-based Intrusion Detection System. Third International Symposium on Intelligent Information Technology and Security Informatics.
  17. Depren, O. , Topallar, M. , Anarim, E. , Ciliz, M. K. 2005. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert System with Applications.
  18. Khalkhal, I. , Azmi, R. , Azimpour-kivi, M. , khansari, M. 2011. Host-based Web Anomaly Intrusion Detection System an Artificial Immune System Approach. In the proceedings of IJCSI International Journal of Computer Science Issues. Volume 8.
  19. De castro, L. N. , Timmis, J. 2002. Artificial Immune System: A new Computational Intelligence Approach. 1st edition Springer-Verlag.
  20. Hofmeyr S. , Forrest, S. 2000. Architecture for an Artificial Immune System. In the proceedings of Evolutionary Computation. Volume 7.
  21. Kim, J. , Bentley, P. The Artificial Immune System for Network Intrusion Detection. 7th European Conference on Intelligent Techniques and Soft Computing, Aechan. Germany. 11
Index Terms

Computer Science
Information Sciences

Keywords

Host based IDS Network based IDS Immune System and Artificial Immune System