DocumentCode
2166899
Title
Intrusion Prevention and self-healing algorithms inspired by danger theory
Author
Elsadig, Muna ; Abdullah, Azween ; Samir, Brahim Belhaouari
Author_Institution
Dept. of Comput. & Inf. Sci., Univ. Teknol. PETRONAS, Tronoh, Malaysia
Volume
5
fYear
2010
fDate
26-28 Feb. 2010
Firstpage
843
Lastpage
846
Abstract
In this paper, software system, design theories and human immune system (HIS) features are used to introduce a novel algorithm for the problem of preventing intrusions and healing the damage which they cause. The HIS features are analyzed and modelled to monitor network systems as to whether the inline activities are behaving abnormally or being attacked. The abnormal activities are prevented and healed by the presented algorithms. We show how the use of biological immune systems, which incorporate an innate, adaptive immune system and self-healing mechanism, can reduce the number of false alerts and heal the damage caused by intrusion. This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self-Healing (SH) mechanism.
Keywords
artificial immune systems; computer network security; fault tolerant computing; HIS features; abnormal activity; adaptive immune system; artificial immune system; autonomous system; biological immune system; computer network security; danger theory; design theory; false alert; human immune system; intrusion prevention; network system monitoring; self-healing algorithm; software system; system continuity; Adaptive systems; Computer networks; Computer security; Distributed control; Humans; Immune system; Intelligent networks; Monitoring; Pathogens; Software algorithms; Self-healing; artificial immune system; danger theory; intrusion prevention;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Conference_Location
Singapore
Print_ISBN
978-1-4244-5585-0
Electronic_ISBN
978-1-4244-5586-7
Type
conf
DOI
10.1109/ICCAE.2010.5451886
Filename
5451886
Link To Document