Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

02/03/2010
by   Julie Greensmith, et al.
0

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, anti-virus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

READ FULL TEXT
research
05/30/2013

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

The use of artificial immune systems in intrusion detection is an appeal...
research
09/05/2012

Automatic firewall rules generator for anomaly detection systems with Apriori algorithm

Network intrusion detection systems have become a crucial issue for comp...
research
04/05/2012

An Implementation of Intrusion Detection System Using Genetic Algorithm

Nowadays it is very important to maintain a high level security to ensur...
research
10/16/2009

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

Network Intrusion Detection Systems (NIDS) are computer systems which mo...
research
03/08/2010

Information Fusion in the Immune System

Biologically-inspired methods such as evolutionary algorithms and neural...
research
08/18/2018

Runtime Analysis of Whole-System Provenance

Identifying the root cause and impact of a system intrusion remains a fo...
research
06/30/2023

Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation

Information technology and telecommunications have rapidly permeated var...

Please sign up or login with your details

Forgot password? Click here to reset