A REVIEW OF HUMAN IMMUNE INSPIRED ALGORITHMS FOR INTRUSION DETECTION SYSTEMS

被引:0
作者
Duru, Chukwuemeka [1 ]
Ladeji-Osias, Jumoke [1 ]
Wandji, Ketchiozo [1 ]
Otily, Toutsop [1 ]
Kone, Rachida [1 ]
机构
[1] Morgan State Univ, Dept Elect & Comp Engn, Baltimore, MD 21251 USA
来源
2022 IEEE WORLD AI IOT CONGRESS (AIIOT) | 2022年
关键词
immune system; negative selection; clonal selection; dendritic cell; intrusion detection; pattern recognition; CLONAL SELECTION ALGORITHM; DANGER THEORY;
D O I
10.1109/AIIOT54504.2022.9817213
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security and trust of Information Systems are critical in its design as they directly influence users' view and acceptance of such systems. Security can be said to be a contextual and dynamic term as there has not been a holistic, universal, and eternal security measure to date. Recent years have seen a lot of confidential and sensitive information being sent, received, and analyzed on the Internet, and a plethora of investigations on ways of developing comprehensive security solutions like encryptions, pattern recognition, and anomaly detection. This work reviews the human inspired algorithms that are particularly employed in pattern recognition and anomaly detection problems. The work discusses the components of the immune system that inspired the artificial Immune System (AIS) based algorithms for pattern and intrusion detection (IDS) problems. A detailed comparison is made between negative selection, clonal selection, and dendritic cell algorithms (danger theory) which are the three major AIS algorithms. AIS is ubiquitous in computer and information security because it is based on the theories developed through years of study and understanding of the human immune system by immunologist. The strengths and weaknesses of these algorithms are also discussed, and possible improvement suggested.
引用
收藏
页码:364 / 371
页数:8
相关论文
共 36 条
[1]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[2]  
Alhasan Seiba, 2021, 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), P7, DOI 10.1109/ICSIoT55070.2021.00011
[3]  
[Anonymous], 2002, THESIS U COLL LONDON
[4]  
[Anonymous], 2018, 2018 6 INT C WIRELES
[5]  
[Anonymous], 2008, Immunological Computation: Theory and Applications
[6]  
Ayara M., 2002, P 1 INT C ART IMM SY
[7]  
Brody L. C, GENOME GOV
[8]  
Brownlee J., 2007, CIS Technical Report
[9]  
Cancer Treatment Center of America, 2022, B CELLS VS T CELLS L
[10]  
Chelly Z, 2012, LECT NOTES ARTIF INT, V7268, P233, DOI 10.1007/978-3-642-29350-4_28