Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

被引:9
作者
Said, Wael [1 ,2 ]
Mostafa, Ayman Mohamed [1 ,3 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72314, Saudi Arabia
关键词
Immune system; Intrusion detection; Databases; Artificial intelligence; Heuristic algorithms; Clustering algorithms; Danger theory model; artificial immune system; negative selection algorithm; database intrusion detection system; NEGATIVE SELECTION ALGORITHM; INTRUSION DETECTION SYSTEM; DENDRITIC CELL ALGORITHM; NEURAL-NETWORKS; MODEL; AIS; CHALLENGES; SIGNAL; ATTACK;
D O I
10.1109/ACCESS.2020.3015399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusion detection systems are utilized to detect, as fast as possible, user's account privilege misuse when a prevention mechanism has failed to address such breaches. In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. The dynamic and more complex nature of cybersecurity, as well as the high false positive rate and high false negative percentage in current intrusion detection systems, are examples of such deficiency. In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system mechanisms. Experimental results for the implementation of the proposed algorithm provide a self-learning mechanism for achieving high detection coverage with a low false positive rate by using the signature of previously detected intrusions as detectors for the future detection process. The proposed algorithm can enhance detecting insider threats and eliminate data breaches by protecting confidentiality, ensuring integrity, and maintaining availability. To give an integrated picture, a comprehensive and informative survey for the different research directions that are related to the proposed algorithm is performed.
引用
收藏
页码:145332 / 145362
页数:31
相关论文
共 50 条
  • [21] EpiDCA: Adaptation and implementation of a danger theory algorithm for event-based epidemiological surveillance
    Boudoua, Bahdja
    Roche, Mathieu
    Teisseire, Maguelonne
    Tran, Annelise
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2025, 229
  • [22] A hybrid particle swarm optimization and artificial immune system algorithm for image enhancement
    Prasant Kumar Mahapatra
    Susmita Ganguli
    Amod Kumar
    Soft Computing, 2015, 19 : 2101 - 2109
  • [23] Intrusion Detection Algorithm of Artificial Immune Based on Decision Tree and Genetic Algorithm
    Fu, Haidong
    Hu, Fan
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4675 - 4679
  • [24] Cloud Computing Security Evaluation Based on Multidimensional Immune Algorithm (MIA)
    Wang, Xiaoyu
    Wang, Heng
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 246 - 250
  • [25] A hybrid clustering algorithm based on P systems and immune mechanisms
    Qin, Li
    Cheng, Fei
    Chen, Zichun
    Huang, Xiaoli
    Peng, Hong
    Liu, Jing
    ICIC Express Letters, 2015, 9 (02): : 485 - 491
  • [26] Immune Based Hybrid Evolutionary Algorithm for Pareto Engineering Optimization
    Shih, C. J.
    Kuan, T. L.
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2008, 11 (04): : 395 - 402
  • [27] Intelligent agent based artificial immune system for computer security-a review
    Ramakrishnan, Sivakumar
    Srinivasan, Sujatha
    ARTIFICIAL INTELLIGENCE REVIEW, 2009, 32 (1-4) : 13 - 43
  • [28] Danger theory based artificial immune system solving dynamic constrained single-objective optimization
    Zhang, Zhuhong
    Yue, Shigang
    Liao, Min
    Long, Fei
    SOFT COMPUTING, 2014, 18 (01) : 185 - 206
  • [29] The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 204 - 211
  • [30] The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 475 - 478