An Immunity Inspired Anomaly Detection System: A General Framework

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 202)


Exponential growth of internet acted as a centrifugal force in the development of a whole new array of applications and services which drives the e-business/ commerce globally. Now days businesses and the vital services are increasingly dependent on computer networks and the Internet which is vulnerable to the evolving and ever growing threats, due to this the users who are participating in various activities over internet are exposed to many security gaps which can be explored to take advantage. These alarming situations gave rise to the concern about security of computer systems/ networks which resulted in the development of various security concepts and products but unfortunately all these systems somehow fail to provide the desired level of security against ever-increasing threats. Later on it has been observed that there lies a huge analogy between the human immune system (HIS) and computer security systems as the previous protects the body from various external and internal threats very effectively. This paper proposes a general immunity inspired security framework which uses the concepts of HIS in order to overcome the ever growing complex security challenges.


Computer security Threat Anomaly HIS Immunity 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Marin A G., Network Security Basics, Security and Privacy, PP 68–72, IEEE, 2005.Google Scholar
  2. 2.
    Bishop M, Computer Security Art and Science, Pearson Education, 2003.Google Scholar
  3. 3.
  4. 4.
    Richardson Robert, “CSI Computer Crime & Security Survey 2010”, 2011.Google Scholar
  5. 5.
    Zafar F. M., Naheed F., Ahmad Z. and Anwar M.M., Network Security: A Survey of Modern Approaches, The Nucleus, 45 (1-2), pp 11-31, 2008.Google Scholar
  6. 6.
    Bishop M, An Overview of Computer Viruses in a Research Environment, 4th DPMA, IEEE, ACM Computer virus and Security Conference, pp 154-163, 1997.Google Scholar
  7. 7.
    Guillen E, Weakness and Strength Analysis over Network-Based Intrusion Prevention & Prevention Systems” Communications, pp 1-5, 2009.Google Scholar
  8. 8.
    Chia-Mei Chen, Ya-Lin Chen, Hsiao-Chung Lin, An efficient network intrusion detection, Computer Communications 33, pp 477–484, 2010.Google Scholar
  9. 9.
    Xiaonan S, Banzhaf W, The use of computational intelligence in intrusion detection systems: A review, App Soft Computing,1–35,2010.Google Scholar
  10. 10.
    Endorf C., Schultz E. and Mellander J.; Intrusion Detection & Prevention, Published by McGraw Hill, 2004.Google Scholar
  11. 11.
    Denning E..D., An Intrusion-Detection Model, IEEE Transactions on Software Engineering, Vol. SE-13.No. 2, pp 222-232, 1987.Google Scholar
  12. 12.
    Mukerjee B., Heberlein T. L., Levitt N. K. Network Intrusion Detection, IEEE Network, pp.26- 41, 1994.Google Scholar
  13. 13.
    Castro L., Timmis J., Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing, Journal, vol. 7, Issue 7, pp 526-544, 2003.Google Scholar
  14. 14.
    Dasgupta D., Forrest S. An Anomaly Detection Algorithm Inspired by the Immune System. Chapter 14 in the book entitled Artificial Immune Systems and their Applications, Publisher: Springer-Verlag, Inc., pp. 262–277, January 1999.Google Scholar
  15. 15.
    Forrest S., Hofmeyr S., Somayaji A., “Computer Immunology,” In Communications of the ACM, vol. 40, no. 10, pp. 88–96, 1997.Google Scholar
  16. 16.
    Dasgupta D., Yu S., Nino F, Recent Advances in Artificial Immune Systems: Models and Applications, Applied Soft Computing, 11, 1574–1587, 2011.Google Scholar
  17. 17.
    Forrest S., Hofmeyr A. S., Somayaji A., Longstaff , A sense of self for Unix processes, in Proceedings of the 1996, IEEE Symposium on Security and Privacy, pp 120-128, 1996.Google Scholar
  18. 18.
    Jungwon K., Bentley P, “The Human Immune System and Network Intrusion Detection”, EUFIT 99, pp 1244-1252, September 1999.Google Scholar
  19. 19.
    Nishiyama H, Mizoguchi F, “Design of Security System Based on Immune System”, pp 138- 143, IEEE 2001.Google Scholar
  20. 20.
    Harmer K.. P., Williams D. P., Gunsch H.G., Lamont B. G., An artificial immune system architecture for computer security applications. IEEE transactions on evolutionary computation 6(3), pp 252–280, 2002.Google Scholar
  21. 21.
    Dasgupta D., Immunity-based Intrusion Detection System: A General Framework, In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147–160, 1999.Google Scholar
  22. 22.
    Ou M Chung, Host-based intrusion detection systems adapted from agent-based artificial immune systems, Neurocomputing, Elsevier, pp 78-86, 2012.Google Scholar
  23. 23.
    Timmis J., Hone A., Stibor T., Clark E., Theoretical advances in artificial immune systems, TCS, Elsevier, 403, pp 11-32, 2008.Google Scholar
  24. 24.
    Zhang Z., Luo W., Wang X., Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B ‘05, Beijing, (2), pp 748–753, 2005.Google Scholar
  25. 25.
    Ishida Y., The next generation of immunity-based systems: from specific recognition to computational intelligence, Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091–1121, 2008.Google Scholar
  26. 26.
    Aickelin U., Greensmith J., Twycross J., Immune system approaches to intrusion detection-a review. ICARIS 2004, LNCS 3239.Springer, pp 316–329, 2004.Google Scholar
  27. 27.
    Overil E R. “Computational immunology and anomaly detection”, Information Security Technical Report, Science Direct, Vol.12, pp 188-191,2007.Google Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  • Saurabh Praneet
    • 1
  • Bhupendra Verma
    • 1
  • Sanjeev Sharma
    • 2
  1. 1.Department of Computer Science and EngineeringTITBhopalIndia
  2. 2.School of Information TechnologyRGPVBhopalIndia

Personalised recommendations