CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Review on Hybrid Intrusion Detection System using Artificial Immune System Approaches

by Pavitra Chauhan, Nidhi Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 20
Year of Publication: 2013
Authors: Pavitra Chauhan, Nidhi Chandra
10.5120/11695-6499

Pavitra Chauhan, Nidhi Chandra . A Review on Hybrid Intrusion Detection System using Artificial Immune System Approaches. International Journal of Computer Applications. 68, 20 ( April 2013), 22-27. DOI=10.5120/11695-6499

@article{ 10.5120/11695-6499,
author = { Pavitra Chauhan, Nidhi Chandra },
title = { A Review on Hybrid Intrusion Detection System using Artificial Immune System Approaches },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 20 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number20/11695-6499/ },
doi = { 10.5120/11695-6499 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:24.050344+05:30
%A Pavitra Chauhan
%A Nidhi Chandra
%T A Review on Hybrid Intrusion Detection System using Artificial Immune System Approaches
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 20
%P 22-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growing advances in the technology the uses of computer systems and the internet is also growing at a rapid rate, and with the increase in their usage vulnerabilities and threats are also increasing tremendously. A large number of approaches have been proposed till now for improving the security of a host system and a network. One of the proposed approach is an Intrusion Detection System (IDS). An IDS works for a system is referred as Host IDS and the one that works for a network is referred as Network IDS. But their functionality is specific to particular host and a network, one does not work as an alternative to another. Thus, an IDS is needed that overcomes the drawbacks of both the systems and combines their advantages to form a Hybrid Intrusion Detection System. An Hybrid IDS captures both host and network data and thereby apply an analysis approach. In order to make these systems robust and effective biologically inspired Artificial Immune System (AIS) approaches can be used that makes the system flexible enough to work in every scenario. This paper provides a review of various IDS and application of various AIS approaches to them.

References
  1. G. Teodoro, J. D. Verdejo, G. Macia-Fernandez, and E. Vazquez, 2009. Anomaly-based network intrusion detection.
  2. Richard A. Kemmerer, and G. Vigna, 2002. Intrusion Detection: A Brief History and Overview.
  3. J. Zheng, Y. Chen, and W. Zhang, 2010. A Survey of artificial immune applications.
  4. Ma Li, Yang Lin, Bai Lin, and W. Rongxi, 2012. Immune network based text clustering algorithm.
  5. M. A. Rassam, and Mohd. A. Maarof, 2012. Artificial immune network clustering approach for anomaly intrusion detection.
  6. Yuan, and Qi-juan Chen, 2012. A dendritic cell algorithm for real-time anomaly detection.
  7. Jon Timmis, 2007. Artificial immune systems-today and tomorrow.
  8. "Dawn of the new Security", Wordpress publication, 2009. Available: http://zulcap. wordpress. com/2009/10/27/lecture-9-intrusion-detection-system-ids/.
  9. Thomas Goeldenitz, 2002. IDS-Today and Tomorrow. SANS Institute InfoSec Reading room site.
Index Terms

Computer Science
Information Sciences

Keywords

Host Intrusion Detection System (HIDS) Network Intrusion Detection System (NIDS) Hybrid intrusion Detection System Artificial Immune System