Advertisement

An Intrusion Detection and Prevention System Using AIS—An NK Cell-Based Approach

  • B. J. BejoyEmail author
  • S. Janakiraman
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)

Abstract

The widespread use of internet in key areas has increased unauthorized attacks in the network. Intrusion detection and prevention system detects as well as prevents the attacks on confidentiality, integrity, and availability of the system. In this paper, an Artificial Immune System based intrusion detection and prevention system is designed using artificial Natural Killer (NK) cells. Random NK cells are generated and negative selection algorithm is applied to eliminate self-identifying cells. These cells detect attacks on the network. High health value cells that detect a large number of attacks are proliferated into the network. When the proliferation reaches a threshold, the NK cells are migrated into the intrusion prevention system. So NK cells in IDS are in promiscuous mode and NK cells in IPS are in inline mode. The technique yields high detection rate, better accuracy and low response time.

Keywords

IDS IPS AIS NK cells MHC1 

References

  1. 1.
    Anderson JP (1980) Computer security threat monitoring and surveillance. Washing, PA, James P. Anderson CoGoogle Scholar
  2. 2.
    Denning DE (1986) An intrusion detection model. In: Proceedings of the seventh IEEE symposium on security and privacyGoogle Scholar
  3. 3.
    Forrest S, Hofmeyr SA, Somayaji A (1997) Computer Immunology. Commun ACM 40(10):88–96CrossRefGoogle Scholar
  4. 4.
    Forrest S, Pereslon AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proceedings of the 1992 IEEE symposium on security and privacy. IEEE Computer Society Press, pp 202–212Google Scholar
  5. 5.
    Burnet FM (1959) The clonal selection theory of acquired immunity. Vanderbilt University Press, USAGoogle Scholar
  6. 6.
    de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6:239–251CrossRefGoogle Scholar
  7. 7.
    Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305CrossRefGoogle Scholar
  8. 8.
    Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel Immune-Inspired algorithm for anomaly detection. Lecture Notes in Computer science, 3627. Springer, Berlin, HeidelbergGoogle Scholar
  9. 9.
    Jerne NK (1974) Towards a network theory of the immune system. Ann Immunol (Inst Pasteur) 125C:373–389Google Scholar
  10. 10.
    Hu X, Liu X, Li T, Yang T, Chen W, Liu Z (2015) Dynamically real-time intrusion detection algorithm with immune network. J Comput Inf Syst 11:587–594Google Scholar
  11. 11.
    Afzali Seresht N, Azmi R (2014) MAIS-IDS: a distributed intrusion detection system using multi-agent AIS approach. Eng Appl Artif Intell 35:286–298CrossRefGoogle Scholar
  12. 12.
    Fu J, Yang H, Liang Y, Tan C (2012) Bait a trap: introducing natural killer cells to artificial immune system for spyware detection. Lecture Notes Computer Science (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 7597. LNCS, pp 125–138Google Scholar
  13. 13.
    Ou CM (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86CrossRefGoogle Scholar
  14. 14.
    Yang J, Liu X, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowl-Based Syst 22:115–119CrossRefGoogle Scholar
  15. 15.
    Zhang P, Tan Y (2015) Immune cooperation mechanism based learning framework. Neurocomputing 148:158–166CrossRefGoogle Scholar
  16. 16.
    Sobh TS, Mostafa WM (2011) A cooperative immunological approach for detecting network anomaly. Appl Soft Comput J 11:1275–1283CrossRefGoogle Scholar
  17. 17.
    Laurentys CA, Ronacher G, Palhares RM, Caminhas WM (2010) Design of an artificial immune system for fault detection: a negative selection approach. Expert Syst Appl 37:5507–5513CrossRefGoogle Scholar
  18. 18.
    Janakiraman S, Vasudevan V (2009) Agent-based DIDS: a intelligent learning approach. Int J Intell Inf Process 8. Serials PublicationsGoogle Scholar
  19. 19.
    Bejoy BJ, Janakiraman S (2017) Artificial immune system based intrusion detection systems—a comprehensive review. Int J Comput Eng Technol 8(1):85–95Google Scholar
  20. 20.
    Arina A, Murillo O, Dubrot J, Azpilikueta A, Alfaro C, PÃrez-Gracia JL, Bendandi M, Palencia B, Hervás-Stubbs S, Melero I (2007) Cellular liaisons of natural killer lymphocytes in immunology and immunotherapy of cancer. Expert Opin Biol Ther 7(5):599–615CrossRefGoogle Scholar
  21. 21.
    NSL KDD CUP 99 Dataset. http://nsl.cs.unb.ca/NSL-KDD

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Banking TechnologyPondicherry UniversityPondicherryIndia

Personalised recommendations