Artificial Immune System (AIS) has evolved substantially from its inception and is utilized to solve complex
problems in different domains out of which computer security is one of them. Computer Security has emerged as a key
research area because of the ever-growing attacks and its methodology. Various security concepts and products were
developed to overcome this alarming situation but these systems by some means fall short to provide the desired protection
against new and ever-increasing threats. AIS enthused from Human Immune System (HIS) is considered as an excellent source
of inspiration to develop computer security solution since the previous protect the body from various external and internal
threats very effectively. This paper presents Immunity Inspired Cooperative Agent based Security System (IICASS) that uses
Enhanced Negative Selection Algorithm (E-RNS) which incorporate fine tuning of detectors and detector power in negative
selection algorithm. These features make IICASS evolve and facilitate better and correct coverage of self or non-self.
Collaboration and communication between different agents make the system dynamic and adaptive that helps it to discover
correct anomalies with degree of severity. Experimental results demonstrate that IICASS show remarkable resilience in
detecting novel unseen attacks with lower false positive.
[1] Ayara M., Timmis J., Lemos R., Castro D., and Duncan R., Negative Selection:How to Generate Detector, in proccedings of 1st International Conference on Artificial Immune System, UK, pp. 182-196, 2002.
[2] Dasgupta D., Immunity-based Intrusion Detection System: A General Framework, in procceding of 22nd Information Systems Security Conference, pp. 147- 160, 1999.
[3] Denning E., An Intrusion-Detection Model, IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987.
[4] Forrest S., Hofmeyr S., and Somayaji A., Computer Immunology, ACM Communications, vol. 40, no. 10, pp. 88-96, 1997.
[5] Forrest S., Perelson A., Allen L., and Cherukuri R., Self-Nonself Discrimination in a Computer, in proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 202-212, 1994.
[6] Kim J. and Bentley P., The Human Immune System and Network Intrusion Detection, in proceedings of 7th European Congress on Intellegent Techniques and Soft Computing (EUFIT'99), pp. 1244-1252, 1999.
[7] KDD Cup. http://kdd.ics.uci.edu/databases/kddcup99/kddcu p99.html, Last Visited 1999.
[8] Lin S., Ying K., Lee C., and Lee Z., An Intelligent Algorithm with Feature Selection and Decision Rules Applied to Anomaly Intrusion Detection, Applied Soft Computing, vol. 12, no. 10, pp. 3285-3290, 2012.
[9] Ou C., Host-based Intrusion Detection Systems Adapted from Agent-based Artificial Immune Systems, Neurocomputing, vol. 88, pp. 78-86, 2012.
[10] Overill E., Computational Immunology and Anomaly Detection, Information Security Technical Report, 2007.
[11] Richardson R., CSI Computer Crime and Security Survey, Computer Security Institute, 2011.
[12] Sereshtn N. and Reza A., MAIS-IDS: A Distributed Intrusion Detection System using Multi-agent AIS Approach, Engineering Applications of Artificial Intelligence, vol. 35, pp. 286-298, 2014.
[13] Sobh T. and Mostafa M., A Cooperative Immunological Approach for Detecting Network Anomaly, Applied Soft Computing, vol. 11, no. 1, pp. 1275-1283, 2011.
[14] Yang J., Liu X., Li T., Liang G., and Liu S., Distributed Agents Model for Intrusion Detection Based on AIS, Knowledge-Based Systems, vol. 22, no. 2, pp. 115-119, 2009. Immunity inspired Cooperative Agent based Security System 295
[15] Zhang P. and Tan Y., Immune Cooperation Mechanism Based Learning Framework, Neurocomputing, vol. 148, pp. 158-166, 2015. Praneet Saurabh has obtained his B.Tech (CSE) from IIIT-Kolkata, Viswa Bharti in 2004 and M.Tech (CTA) from SOIT, Bhopal in 2007. He is a Ph.d student at RGPV, Bhopal and working as Assistant Professor in Department of Computer Science and Engineering at TIT, Bhopal. He has published more than 10 research papers in different journals and conferences. His area of research includes Computer Security, Evolutionary Computation and Mobile Adhoc Networks. Bhupendra Verma has done B.E and M.Tech in Computer Science and Engineering from SATI, Vidisha, M.P., India. He has completed his Ph.D. in Computer Science and Engineering from RGPV Bhopal in 2008. He is working as Director TIT (Excellence), Bhopal. He has published 52 research papers in journals and conferences. His area of research includes but not limited to Artificial Intelligence, Soft Computing, Computer Security, Evolutionary Computation, Human computer Interaction.
Cite this
Department of Computer Science and Engineering, Technocrats Institute of Technology, India, "Immunity inspired Cooperative Agent based", The International Arab Journal of Information Technology (IAJIT) ,Volume 15, Number 02, pp. 113 - 119, March 2018, doi: .
@ARTICLE{3710,
author={Department of Computer Science and Engineering, Technocrats Institute of Technology, India},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Immunity inspired Cooperative Agent based},
volume={15},
number={02},
pages={113 - 119},
doi={},
year={1970}
}
TY - JOUR
TI - Immunity inspired Cooperative Agent based
T2 -
SP - 113
EP - 119
AU - Department of Computer Science and Engineering
AU - Technocrats Institute of Technology
AU - India
DO -
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 15
VL - 15
JA -
Y1 - Jan 1970
ER -
PY - 1970
Department of Computer Science and Engineering, Technocrats Institute of Technology, India, " Immunity inspired Cooperative Agent based", The International Arab Journal of Information Technology (IAJIT) ,Volume 15, Number 02, pp. 113 - 119, March 2018, doi: .
Abstract: Artificial Immune System (AIS) has evolved substantially from its inception and is utilized to solve complex
problems in different domains out of which computer security is one of them. Computer Security has emerged as a key
research area because of the ever-growing attacks and its methodology. Various security concepts and products were
developed to overcome this alarming situation but these systems by some means fall short to provide the desired protection
against new and ever-increasing threats. AIS enthused from Human Immune System (HIS) is considered as an excellent source
of inspiration to develop computer security solution since the previous protect the body from various external and internal
threats very effectively. This paper presents Immunity Inspired Cooperative Agent based Security System (IICASS) that uses
Enhanced Negative Selection Algorithm (E-RNS) which incorporate fine tuning of detectors and detector power in negative
selection algorithm. These features make IICASS evolve and facilitate better and correct coverage of self or non-self.
Collaboration and communication between different agents make the system dynamic and adaptive that helps it to discover
correct anomalies with degree of severity. Experimental results demonstrate that IICASS show remarkable resilience in
detecting novel unseen attacks with lower false positive. URL: https://iajit.org/paper/3710
@ARTICLE{3710,
author={Department of Computer Science and Engineering, Technocrats Institute of Technology, India},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Immunity inspired Cooperative Agent based},
volume={15},
number={02},
pages={113 - 119},
doi={},
year={1970}
,abstract={Artificial Immune System (AIS) has evolved substantially from its inception and is utilized to solve complex
problems in different domains out of which computer security is one of them. Computer Security has emerged as a key
research area because of the ever-growing attacks and its methodology. Various security concepts and products were
developed to overcome this alarming situation but these systems by some means fall short to provide the desired protection
against new and ever-increasing threats. AIS enthused from Human Immune System (HIS) is considered as an excellent source
of inspiration to develop computer security solution since the previous protect the body from various external and internal
threats very effectively. This paper presents Immunity Inspired Cooperative Agent based Security System (IICASS) that uses
Enhanced Negative Selection Algorithm (E-RNS) which incorporate fine tuning of detectors and detector power in negative
selection algorithm. These features make IICASS evolve and facilitate better and correct coverage of self or non-self.
Collaboration and communication between different agents make the system dynamic and adaptive that helps it to discover
correct anomalies with degree of severity. Experimental results demonstrate that IICASS show remarkable resilience in
detecting novel unseen attacks with lower false positive.},
keywords={Anomaly, human immune system, artificial immune system, agent},
ISSN={2413-9351},
month={Jan}}
TY - JOUR
TI - Immunity inspired Cooperative Agent based
T2 -
SP - 113
EP - 119
AU - Department of Computer Science and Engineering
AU - Technocrats Institute of Technology
AU - India
DO -
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 15
VL - 15
JA -
Y1 - Jan 1970
ER -
PY - 1970
AB - Artificial Immune System (AIS) has evolved substantially from its inception and is utilized to solve complex
problems in different domains out of which computer security is one of them. Computer Security has emerged as a key
research area because of the ever-growing attacks and its methodology. Various security concepts and products were
developed to overcome this alarming situation but these systems by some means fall short to provide the desired protection
against new and ever-increasing threats. AIS enthused from Human Immune System (HIS) is considered as an excellent source
of inspiration to develop computer security solution since the previous protect the body from various external and internal
threats very effectively. This paper presents Immunity Inspired Cooperative Agent based Security System (IICASS) that uses
Enhanced Negative Selection Algorithm (E-RNS) which incorporate fine tuning of detectors and detector power in negative
selection algorithm. These features make IICASS evolve and facilitate better and correct coverage of self or non-self.
Collaboration and communication between different agents make the system dynamic and adaptive that helps it to discover
correct anomalies with degree of severity. Experimental results demonstrate that IICASS show remarkable resilience in
detecting novel unseen attacks with lower false positive.