Intelligent agent based artificial immune system for computer security—a review



Since its introduction in the 1990s the internet has proliferated in the life of human kind in many numbers of ways. The two by-products of the internet are intelligent agents and intrusions which are far away from each other in the intention of their creation while similar in their characteristics. With automated code roaming the network intruding the users on one side as worms, viruses, and Trojans and autonomous agents tending to help the users on the other side, the internet has given great research challenges to the computer scientists. The greatest challenge of the internet is intrusion, which has increased and never decreased. There are various security systems for the internet. As the Human Immune System protects human body from external attacks, these security systems tend to protect the internet from intruders. Thus the internet security systems are comparable with human immune systems in which autonomous cells move throughout the body to protect it while learning to tackle new threats and keeping them in their memory for the future. These properties are comparable with that of autonomous agents in the internet. Thus intelligent agent technology combined with ideas from human immune system is a great area of research which is still in its developing phase. In this paper, state of the art of security systems which use both these technologies of intelligent agents and artificial immune system i.e., Agent Based Artificial Immune System (ABAIS) for security are reviewed, paying special attention to features of human immune system used in the system, the role of the agents in the ABAIS and the security mechanisms provided against intrusions.


Artificial immune system Intrusion detection system Computer security Agent based IDS Network security 


  1. Ahmedi MR, Maleki D (2008) An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD). IJCSNS Int J Comput Sci Netw Sec 8(4): 160–169Google Scholar
  2. Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceedings of the 1st internat. Conference on aRtificial immune systems (ICARIS-2002), UK, Canterbury, pp 141–148Google Scholar
  3. Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection—a review. In: Nicosia G et al (eds) ICARIS 2004, LNCS 3239. Springer, pp 316–329Google Scholar
  4. Baumer C, Breugst M, Choy S, Magedanz T (2004) Grasshopper—a universal agent platform based on OMG MASIF and FIPA standards, Grasshopper developed by the ikv++ technologies. Accessed on
  5. Boukerche A, Machado RB, Juca KRL, Sobral JBM, Notare MSMA (2007) An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput Commun (30), 2649–2660, ElsevierGoogle Scholar
  6. Bye R, Schmidt S, Luther K, Albayrak S (2008) Application-level simulation for network security. In: Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops, March 03–07, 2008, France, MarseilleGoogle Scholar
  7. Byrski A, Carvalho M (2008) Agent-based immunological intrusion detection system for mobile Ad-Hoc networks. In: Bubak M et al (eds) ICCS 2008, Springer, pp 584–593Google Scholar
  8. Claessens J, Preneel B, Vandewalle J (2003) (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans Int Technol 3(1): 28–48CrossRefGoogle Scholar
  9. Dasgupta D (1999) Immunity-based intrusion detection system : a general framework. In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147–160Google Scholar
  10. Dasgupta D, Ji Z, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: Proceedings of congress on evolutionary computation conference (CEC). Canberra, Australia: December, pp 123–130Google Scholar
  11. Gong X, Li T, Liang G, Wang T, Yang J, Hu X (2006a) Immunity and mobile agent based grid intrusion detection. In: Huang D-S, Li K, Irwin GW (eds) Proceedings of ICIC 2006, LNBI 4115, Springer, pp 651–659Google Scholar
  12. Gong X, Li T, Wang T, Yang J, Liu S, Liang G (2006b) An immune mobile agent based grid intrusion detection model. In: Wang T-D et al (eds) Proceedings of SEAL 2006, LNCS 4247, Springer, pp 112–119Google Scholar
  13. Gong X, Li T, Wang T, Yang J, Liang G, Hu X (2006c) Grid intrusion detection based on immune agent. In: Jiao L et al (eds) Proceedings of ICNC 2006, Part II, LNCS 4222, Springer, pp 73–82Google Scholar
  14. Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: the dendritic cell algorithm. Robust intelligent systems, Springer, London, pp 89–112Google Scholar
  15. Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comput 6(3): 252–280CrossRefGoogle Scholar
  16. Hilker M (2008) Next challenges in bringing artificial immune systems to production in network security. In: Proceedings of BIONETICS, Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.orgGoogle Scholar
  17. Hu Q, Qui J, Song G (2007) Immune multi-agent network intrusion defense model. In: Proceedings of the third international conference on natural computation (ICNC 2007), pp 2875–2879Google Scholar
  18. Ishida Y (2008) The next generation of immunity-based systems: from specific recognition to computational intelligence. Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091–1121Google Scholar
  19. Kim J, Bentley J P, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection—a review. Natural computing, vol 6. Springer, Berlin, pp 413–466Google Scholar
  20. Le Boudec J-Y, Sarajanovic S (2004) An artificial immune system approach to misbehavior detection in mobile Ad-Hoc networks. In: Proceedings of Bio-ADIT 2004 (The first international workshop on biologically inspired approaches to advanced information technology), Lausanne, Switzerland, pp 96–111Google Scholar
  21. Liu S, Li T, Wang D, Zhao K, Gong X, Hu X, Xu C, Liang G (2006) Immune multi-agent active defense model for network intrusion. In: Wang et al (eds) SEAL 2006, LNCS 4247, Springer, pp 104–111Google Scholar
  22. Liu S, Li T, Wang D, Hu X, Xu C (2007) Multi-agent network intrusion active defense model based on immune theory, Wuhan University. J Nat Sci 12(1): 167–171Google Scholar
  23. Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative AIS framework for intrusiondetection. In: Proceedings of the international conference on communications, Glasgow, pp 1409–1416, doi:10.1109/ICC.2007.237
  24. Machado RB, Boukerche A, Sobral JBM, Juca KRL, Notare Mirela SMA (2005) A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations. In: Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05), 1530-2075/05Google Scholar
  25. Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: Apolloni B et al (eds) KES 2007/ WIRN 2007, LNAI 4694, Springer, pp 821–829Google Scholar
  26. Watanabe Y, lshida Y (2004) Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. In: Proceedings of artificial life robotics (ISAROB, 2004), vol 8, pp 163–167Google Scholar
  27. Yampolskiy RV, Govindaraju V (2007) Computer security: a survey of methods and systems. J Comput Sci 3(7): 478–486CrossRefGoogle Scholar
  28. Yang J, Liu XJ, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowledge-based systems 22(2):115–119, ElsevierGoogle Scholar
  29. Yeom K-W, Park J-H (2005) An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks. In: Hao Y et al (eds) CIS 2005, Springer, pp 204–211Google Scholar
  30. Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729–740, SpringerGoogle Scholar
  31. Zhang Z, Luo W, Wang X (2005) Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B ‘05, Beijing, (2):748–753. doi:10.1109/ICNNB.2005.1614734
  32. Zhongmin C, Yu W, Baowen X (2007) The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the international conference on wireless communications, Networking and mobile computing. WiCom 2007, Shanghai, pp 1779–1783Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2009

Authors and Affiliations

  1. 1.Department of Computer ScienceAVVM Sri Pushpam CollegeThanjavurIndia
  2. 2.Barathidasan UniversityTrichyIndia

Personalised recommendations