The International Arab Journal of Information Technology (IAJIT)


Immunity inspired Cooperative Agent based

Artificial Immune System (AIS) has evolved substantially from its inception and is utilized to solve complex problems in different domains out of which computer security is one of them. Computer Security has emerged as a key research area because of the ever-growing attacks and its methodology. Various security concepts and products were developed to overcome this alarming situation but these systems by some means fall short to provide the desired protection against new and ever-increasing threats. AIS enthused from Human Immune System (HIS) is considered as an excellent source of inspiration to develop computer security solution since the previous protect the body from various external and internal threats very effectively. This paper presents Immunity Inspired Cooperative Agent based Security System (IICASS) that uses Enhanced Negative Selection Algorithm (E-RNS) which incorporate fine tuning of detectors and detector power in negative selection algorithm. These features make IICASS evolve and facilitate better and correct coverage of self or non-self. Collaboration and communication between different agents make the system dynamic and adaptive that helps it to discover correct anomalies with degree of severity. Experimental results demonstrate that IICASS show remarkable resilience in detecting novel unseen attacks with lower false positive.

[1] Ayara M., Timmis J., Lemos R., Castro D., and Duncan R., Negative Selection:How to Generate Detector, in proccedings of 1st International Conference on Artificial Immune System, UK, pp. 182-196, 2002.

[2] Dasgupta D., Immunity-based Intrusion Detection System: A General Framework, in procceding of 22nd Information Systems Security Conference, pp. 147- 160, 1999.

[3] Denning E., An Intrusion-Detection Model, IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987.

[4] Forrest S., Hofmeyr S., and Somayaji A., Computer Immunology, ACM Communications, vol. 40, no. 10, pp. 88-96, 1997.

[5] Forrest S., Perelson A., Allen L., and Cherukuri R., Self-Nonself Discrimination in a Computer, in proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 202-212, 1994.

[6] Kim J. and Bentley P., The Human Immune System and Network Intrusion Detection, in proceedings of 7th European Congress on Intellegent Techniques and Soft Computing (EUFIT'99), pp. 1244-1252, 1999.

[7] KDD Cup. p99.html, Last Visited 1999.

[8] Lin S., Ying K., Lee C., and Lee Z., An Intelligent Algorithm with Feature Selection and Decision Rules Applied to Anomaly Intrusion Detection, Applied Soft Computing, vol. 12, no. 10, pp. 3285-3290, 2012.

[9] Ou C., Host-based Intrusion Detection Systems Adapted from Agent-based Artificial Immune Systems, Neurocomputing, vol. 88, pp. 78-86, 2012.

[10] Overill E., Computational Immunology and Anomaly Detection, Information Security Technical Report, 2007.

[11] Richardson R., CSI Computer Crime and Security Survey, Computer Security Institute, 2011.

[12] Sereshtn N. and Reza A., MAIS-IDS: A Distributed Intrusion Detection System using Multi-agent AIS Approach, Engineering Applications of Artificial Intelligence, vol. 35, pp. 286-298, 2014.

[13] Sobh T. and Mostafa M., A Cooperative Immunological Approach for Detecting Network Anomaly, Applied Soft Computing, vol. 11, no. 1, pp. 1275-1283, 2011.

[14] Yang J., Liu X., Li T., Liang G., and Liu S., Distributed Agents Model for Intrusion Detection Based on AIS, Knowledge-Based Systems, vol. 22, no. 2, pp. 115-119, 2009. Immunity inspired Cooperative Agent based Security System 295

[15] Zhang P. and Tan Y., Immune Cooperation Mechanism Based Learning Framework, Neurocomputing, vol. 148, pp. 158-166, 2015. Praneet Saurabh has obtained his B.Tech (CSE) from IIIT-Kolkata, Viswa Bharti in 2004 and M.Tech (CTA) from SOIT, Bhopal in 2007. He is a Ph.d student at RGPV, Bhopal and working as Assistant Professor in Department of Computer Science and Engineering at TIT, Bhopal. He has published more than 10 research papers in different journals and conferences. His area of research includes Computer Security, Evolutionary Computation and Mobile Adhoc Networks. Bhupendra Verma has done B.E and M.Tech in Computer Science and Engineering from SATI, Vidisha, M.P., India. He has completed his Ph.D. in Computer Science and Engineering from RGPV Bhopal in 2008. He is working as Director TIT (Excellence), Bhopal. He has published 52 research papers in journals and conferences. His area of research includes but not limited to Artificial Intelligence, Soft Computing, Computer Security, Evolutionary Computation, Human computer Interaction.