International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 8 - Issue 10, October 2019 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616


[Full Text]



Ankita Trivedi , Dr. Aumreesh Kumar Saxena, M. Arshad , Mr. Shivendra Dubey and Dr. Sitesh Kumar Sinha



Adaptive immune system, innate immune system, intrusion detection, negative selection algorithm, human immune system. detection rate, network security.



Researchers and scientists are always motivated by environment and natural organisms to crack real world problems. Protection of computer systems is no exclusion. For identifying intrusion, artificial immune system motivated from natural defense system works proficiently. In this proposed methodology, we are implementing two levels of defense for computer security. The primary level of defense is Innate Immune system and the secondary is Adaptive Immune system. For Innate immune system, detectors are generated using negative selection algorithm. The result reveals the effectiveness of proposed methodology for detecting intrusion against malicious attacks on the network system



[1] S. Konyeha and E. A. Onibere, "Computer Immunity Using an Intrusion Detection System (IDS)", Advanced Materials Research, Vol. 824, pp. 200-205, 2013
[2] S Forrest, SA Hofmeyr, Aomayaji, 1997 Computer Immunology Communications of the ACM.
[3] D.Dasgupta, 2007 “Immuno-inspired automatic system for cyber defense”, Information Security, Tech Rep., Volume12, Issue 4, pp.235-241.
[4] U. Aickelin, D. Dasgupta, 2014 Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, Artificial Immune Systems, Chapter 13, pp. 1-29.
[5] Carlos A Catania, Carlos Garcia Garino, 2012 “Automatic Network Intrusion Detection. Current techniques and open issue electrical Engineering”
[6] Chung-Ming Ou, 2012 “Host-based Intrusion Detection Systems adapted from Agent-based Artificial Immune Systems”, Neurocomputing, Volume 88,pp. 78-86.
[7] Sugata Sanyal, Manoj Rameshchandra Thakur, 2012 “A Multi-Dimensional approach towards Intrusion Detection System”, International Journal of Computer Applications (0975 – 888), Volume 48, Issue 5
[8] Junyuan Shen, Jidong Wang, Hao Ai, 2012, “An Improved Artificial Immune System-Based Network”, volume4, page 41-47.
[9] Hua Yang, Tao Li, Xinlei Hu, Feng Wang and Yang Zou, 2014, “A Survey of Artificial Immune System Based Intrusion Detection”
[10] Jamie Twycross, Uwe Aickelin, 2008 “An Immune-Inspired Approach to Anomaly Detection”, Handbook of Research on Information Security and Assurance, Information Science Reference, Hershey, New York.
[11] Jamie Twycross, Uwe Aickelin, Amanda Whitbrook, 2010 “Detecting Anomalous Process Behaviour using Second Generation Artificial Immune”, International Journal for Unconventional Comp., Volume 6, Issue 3–4, pp. 301–326.
[12] Chandrakant Jain, Aumreesh Kumar Saxena “ General Study of Mobile Agent Based Intrusion Detection System(IDS)” published in Journal of Computer and Communication (JCC) Vol. 4, No.4, April 2016, Page:93-98, DOI: 10.4236/jcc.2016.44008, ISSN: 2327-5227,.
[13] Man-Ki Yoon, Sibin Mohany, Jaesik Choiz, and Lui Sha, 2015 “Memory Heat Map: Anomaly Detection in Real-Time Embedded Systems Using Memory Behavior”, DAC ’15, ACM Digital Library, ISBN: 978-1-4503-3520-1.
[14] Meng-Hui Chen, pei-ChannChang, Jheng-LongWu, 2016 “A Population-based Incremental Learning Approach with Artificial Immune System for Network Intrusion Detection”, Engineering Applications of Artificial Intelligence”, (51)171–181.
[15] Farhoud Hosseinpour, Sureswaran Ramadass, Andrew Meulenberg, Payam Vahdani Amoli and Zahra Moghaddasi, 2013 “Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System”, International Journal of Digital Content Technology and its Applications (JDCTA)
[16] U Aickelin, P Bentley, S Cayzer, J Kim, and J McLeod. Danger theory: The link between ais and ids. In Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS-03), pages 147–155, 2003.
[17] J. Greensmith and U. Aickelin, “Dendritic cells for SYN scan detection,” in Proceedings of the 9th Annual Genetic and Evolutionary Computation Conference (GECCO '07), pp. 49–56, London, UK, July 2007.
[18] D. Dasgupta, S. Yu, and N. S. Majumdar, “MILA-multilevel immune learning algorithm and its application to anomaly detection,” Soft Computing, vol. 9, no. 3, pp. 172–184, 2005.
[19] J Kim and P Bentley. Evaluating negative selection in an artificial immune system for network intrusion detection. Proceedings of GECCO, pages 1330 -1337,July 2001.
[20] Uwe Aickelin, Julie Greensmith, Jamie Twycross, 2004 “A Immune System Approaches to Intrusion Detection”.
[21] J. Greensmith and U. Aickelin, “Dendritic cells for real-time anomaly detection,” in Proceedings of the Workshop on Artificial Immune Systems and Immune System Modelling (AISB '06), pp. 7–8, Bristol, UK, April 2006.
[22] SA Hofmeyr and S Forrest, Immunity by design: An artificial immune system, Proceedings of Genetic and Evolutionary Computation Conference, pp. 1289-1296, 1999.
[23] U Aickelin, D Dasgupta, Artificial immune systems tutorial, E Burke, G Kendall (Eds.), Search methodologies introductory tutorials in optimization and decision support techniques, Kluwer, pp. 375399, 2005.
[24] J Greensmith, A Whitbrook, U Aickelin, Artificial immune systems, Handbook of Metaheuristics, Springer US, pp. 421-448, 2010.
[25] S Forrest, Self-nonself discrimination in a computer, IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202-212, May 1994.
[26] X Shen, XZ Gao, R Bie, X Jin, Artificial Immune Networks: Models and Applications, International Conference on Computational Intelligence and Security, Vol. 1, pp. 394-397, 2006.
[27] Aumreesh Ku. Saxena ; Sitesh Sinha ; Piyush Shukla “Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System” published in IJCNIS Vol. 10, No. 3, Mar. 2018 Pages:17-24 DOI: 10.5815/ijcnis.2018.03.03 ISSN: 2074-9104
[28] Aumreesh Ku. Saxena ; Sitesh Sinha ; Piyush Shukla “Implementation of Mobile Agent Intrusion Detection System Based on Significant Parameters” published in ANUSANDHAN- AISECT University Journal Vol. 06, Issue No. 13, Page: March-2018, E-ISSN 2457-0656
[29] Inadyuti Dutt, Samarjeet Borah, Indrakant Maitra, 2016 “Intrusion detection system using Artificial Immune system”, Volume 144-No.12.