Skip to main content

PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 424))

Abstract

Intrusion Detection Systems (IDS) are one of the primary components in keeping a network secure. They are classified into different forms based on the nature of their functionality such as Host based IDS, Network based IDS and Anomaly based IDS. However, Literature survey portrays different evasion techniques of IDS. Thus it is always important to study the responsive behavior of IDS after such failures. The state of the art shows that much work have been done on IDS on contrary to little on Intrusion Response System (IRS). In this paper we propose a model of IRS based on the inspiration derived from the functioning of defense and response mechanism in plants such Systemic Acquired Resistance (SAR). The proposed model is the first attempt of its kind with the objective to develop an efficient response mechanism in a network subsequent to the failure of IDS, adopting plants as a source of inspiration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ma, W., Tran, D., Sharma, D.: Negative selection with antigen feedback in intrusion detection. In: Artificial Immune Systems, pp. 200–209. Springer (2008)

    Google Scholar 

  2. Shameli-Sendi, A., Cheriet, M., Hamou-Lhadj, A.: Taxonomy of intrusion risk assessment and response system. Comput. Secur. 45, 1–16 (2014)

    Article  Google Scholar 

  3. Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. Int. J. Inf. Comput. Secur. 1(1), 169–184 (2007)

    Google Scholar 

  4. Weaver, N., Paxson, V., Staniford, S.,. Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 11–18. ACM (2003)

    Google Scholar 

  5. Jones, J.D., Dangl, J.L.: The plant immune system. Nature 444(7117), 323–329 (2006)

    Article  Google Scholar 

  6. Jones, A.M., Monaghan, J., Ntoukakis, V.: Editorial: mechanisms regulating immunity in plants. Front. Plant Sci. 4 (2013)

    Google Scholar 

  7. Nicaise, V., Roux, M., Zipfel, C.: Recent advances in pamp-triggered immunity against bacteria: pattern recognition receptors watch over and raise the alarm. Plant Physiol. 150(4), 1638–1647 (2009)

    Article  Google Scholar 

  8. Zipfel, C.: Pattern-recognition receptors in plant innate immunity. Curr. Opin. Immunol. 20(1), 10–16 (2008)

    Article  Google Scholar 

  9. Zhou, J.-M., Chai, J.: Plant pathogenic bacterial type iii effectors subdue host responses. Curr. Opin. Microbiol. 11(2), 179–185 (2008)

    Article  Google Scholar 

  10. Melotto, M., Underwood, W., Koczan, J., Nomura, K., He, S.Y.: Plant stomata function in innate immunity against bacterial invasion. Cell 126(5), 969–980 (2006)

    Article  Google Scholar 

  11. Spoel, S.H., Dong, X.: How do plants achieve immunity? Defence without specialized immune cells. Nat. Rev. Immunol. 12(2), 89–100 (2012)

    Article  Google Scholar 

  12. Vlot, A.C., Klessig, D.F., Park, S.-W.: Systemic acquired resistance: the elusive signal(s). Curr. Opin. Plant Biol. 11(4), 436–442 (2008)

    Article  Google Scholar 

  13. Chisholm, S.T., Coaker, G., Day, B., Staskawicz, B.J.: Host-microbe interactions: shaping the evolution of the plant immune response. Cell 124(4), 803–814 (2006)

    Article  Google Scholar 

  14. Muthamilarasan, M., Prasad, M.: Plant innate immunity: an updated insight into defense mechanism. J. Biosci. 38(2), 433–449 (2013)

    Article  Google Scholar 

  15. De Boer, P., Pels, M.: Host-based Intrusion Detection Systems. Amsterdam University, Amsterdam (2005)

    Google Scholar 

  16. Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Commun. ACM 20(10), 762–772 (1977)

    Article  MATH  Google Scholar 

  17. Sharif, M.I., Lanzi, A. Giffin, J.T., Lee, W.: Impeding malware analysis using conditional code obfuscation. In: NDSS (2008)

    Google Scholar 

  18. Latif, A., Syaza, N.: Mathematical modelling of induced resistance to plant disease: a thesis presented in partial fulfilment of the requirements for the degree of doctor of philosophy in mathematics at Massey University, Albany campus, New Zealand. Ph.D. dissertation, The author (2014)

    Google Scholar 

  19. Serazzi, G., Zanero, S.: Computer virus propagation models. In: Performance Tools and Applications to Networked Systems, pp. 26–50. Springer (2004)

    Google Scholar 

  20. Forrest, S.., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: 2012 IEEE Symposium on Security and Privacy, pp. 202–202. IEEE Computer Society (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Rupam Kumar Sharma or Hemanta Kr Kalita .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Sharma, R.K., Kalita, H.K., Issac, B. (2016). PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants. In: Snášel, V., Abraham, A., Krömer, P., Pant, M., Muda, A. (eds) Innovations in Bio-Inspired Computing and Applications. Advances in Intelligent Systems and Computing, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-28031-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28031-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28030-1

  • Online ISBN: 978-3-319-28031-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics