Intrusion Detection and Prevention: Immunologically Inspired Approaches

Devid Pipa

(2008)

Devid Pipa (2008) Intrusion Detection and Prevention: Immunologically Inspired Approaches.

Our Full Text Deposits

Full text access: Open

Full Text - 586.62 KB

Links to Copies of this Item Held Elsewhere


Abstract

Computer security can be viewed as a process of discrimination between authorized actions, legitimate users, etc, and intrusions such as viruses, trojans, etc. The immune system of the human body has been performing such an action for a much longer time and it is very likely that it has developed a set of techniques and mechanisms that are, in comparison, a great deal better than the ones used in the current computer security systems. And it certainly has, as in the opposite case, the human race would be extinguished by now. The immune system of the human body is a collection of mechanisms and techniques that offer an overall defense for the organism in a both distributed and localized manner. These are specific and non specific mechanisms. The specific ones offer a level of defense against one single type of threat, whereas the non specific ones have a more wide range. This is much like the defense mechanism in the information security world such as specific ones, through virus signatures and non specific ones such as firewalls and encryption mechanisms. The specific ones, are a good way of defense towards known and previously encountered attacks, for which a signature as been developed. These however have a difficulty in keeping up with the dynamically changing attacks. The non specific ones, do offer a good level of general defense, however they are static. They form a preventive barrier in the prospect of intrusion and are not able to detect a currently ongoing intrusion. The immune system offers levels of defense for the organism that are very dynamic. They prevent known intrusions and are also able to dynamically adapt themselves in order to detect ongoing ones. This latter concept is the one of interest to this study. The idea of applying immunological principles to the systems of computer security was introduced in 1994 by Jeffrey Kephart in the design for an immune system for computers and networks.

Information about this Version

This is a Published version
This version's date is: 15/01/2008
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/0501de99-33e4-570d-175a-db6ab072ee74/1/

Item TypeMonograph (Technical Report)
TitleIntrusion Detection and Prevention: Immunologically Inspired Approaches
AuthorsPipa, Devid
DepartmentsFaculty of Science\Mathematics

Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

[1] – “Immunology Basics” Prof Genc Sylcebe and Ass. Prof. Arben Hoxha – Base text for the faculty
of medicine Tirana. - 2001.

[2] – “The Immune System” - www.library.thinkquest.com.

[3] – “ Immunology Overview” - Armand S. Goldman and Bellur S Prabhakar.

[4] – “MHC Complex” - www.keratin.com/am/am022.html.

[5] – “An Immunological Approach to Change Detection: Algorithms, Analysis and Implications” Patrik
D'haeseleer, Stephanie Forrest, Paul Helman.

[6] – “A Distributes Approach to Anomaly Detecton” Patrik D'haeseleer, Stephanie Forrest, Paul
Helman.

[7] – “A Sense of Self for UNIX Processes” Stephanie Forrest , Steven A. Hoffmeyr and Anil Somayaji
– In proceeding of the 1996 IEEE symposium on security and privacy.

[8] – “Classification and Detection of Computer Intrusions” S.Kumar – PhD Thesis – Department of
Computer Science, Purdue University – August 1995.

[9] – “Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring” C. Ko,
G. Fink and K. Levitt – In proceedings of the 10-th annual Computer Security Applications
Conference – December 1994.

[10] – “An Immunological Model of Distributed Detection and its Application to Computer Security”
Steven Andrew Hofmeyr – May 1999.

[11] – “Implementation of a Computer Immune System for Intrusion and Virus Detection” Markus
Christoph Unterleitner – February 2006.

[12] – “Cellular and Molecular Immunology” Abul K. Abbas, Andrew H. Lichtman and Jordan S. Pober.

[13] – “Self/NonSelf Discrimination in a Computer” Stephanie Forrest, Alan S. Perelson, Lawrence
Allen. and Rajesh Cherkuri – In Proceedings of 1994 IEEE Symposium on Research in Security and
Privacy.

[14] – “Computer Immunology” Steven A. Hofmeyr, Stephanie Forrest and Anil Somayaji.

[15] – “Biologically Inspired Immune System for Computers” Jeffrey O. Kephart – Fourth International
Workshop on the Sysnthesis and Simulation of Living Systems.

[16] – “Comparing Immunological and Rule Based Intrusion Detection Methods” John Hall.

[17] – “Principles of a Computer Immune System” Anil Somayaji, Steven Hofmeyr and Stephanie
Forrest – 1997 New Security Paradigms Workshop, Langdale, Cumbria.

[18] – “Computer Security” a.k.a. “The Yellow Book” Jason Crampton – 2006.

[19] – “The Protection of Information in Computer Systems” J. Saltzer and M. Shroeder – In Proceedings
of the IEEE – 1975.

[20] – “A Principle of Kernel Design” G. J. Popek – In Proceedings of the 1974 NCC AFIPS Conference,
Volume 43 – 1974.

[21] – “Intrusion Detection Using Sequences of System Calls” Steven A. Hofmeyr, Stephanie Forrest,
Anil Somayaji – December 1997.

[22] – “Oxford Advanced Learners Dictionary of Current English” - AS Hornby – New Edition – 1974.

[23] – “Kerberos: An Authentication Service for Computer Networks” B. C. Newman and T. Ts'o – IEEE
Communications Magazine – 1994.

[24] – “Comparing Immunological and Rule Based Intrusion Detection Methods” John Hall.

[25] – “The Free On-Line Dictionary” - www.thefreedictionary.com.

[26] – “NIST Official Website” - www.nist.org.

[27] – “Further Efficient Algorithms for Generating Antibody Strings” P. D'haeseleer – Technical Report
CS95-3 – 1995.


Details