Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

被引:9
|
作者
Said, Wael [1 ,2 ]
Mostafa, Ayman Mohamed [1 ,3 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72314, Saudi Arabia
关键词
Immune system; Intrusion detection; Databases; Artificial intelligence; Heuristic algorithms; Clustering algorithms; Danger theory model; artificial immune system; negative selection algorithm; database intrusion detection system; NEGATIVE SELECTION ALGORITHM; INTRUSION DETECTION SYSTEM; DENDRITIC CELL ALGORITHM; NEURAL-NETWORKS; MODEL; AIS; CHALLENGES; SIGNAL; ATTACK;
D O I
10.1109/ACCESS.2020.3015399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusion detection systems are utilized to detect, as fast as possible, user's account privilege misuse when a prevention mechanism has failed to address such breaches. In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. The dynamic and more complex nature of cybersecurity, as well as the high false positive rate and high false negative percentage in current intrusion detection systems, are examples of such deficiency. In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system mechanisms. Experimental results for the implementation of the proposed algorithm provide a self-learning mechanism for achieving high detection coverage with a low false positive rate by using the signature of previously detected intrusions as detectors for the future detection process. The proposed algorithm can enhance detecting insider threats and eliminate data breaches by protecting confidentiality, ensuring integrity, and maintaining availability. To give an integrated picture, a comprehensive and informative survey for the different research directions that are related to the proposed algorithm is performed.
引用
下载
收藏
页码:145332 / 145362
页数:31
相关论文
共 50 条
  • [1] A Novel Artificial Immune Algorithm Based on Danger Theory
    Lu, Hong
    Wei, Wei
    PROCEEDINGS OF THE 2012 24TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2012, : 3748 - 3750
  • [2] A Danger-Theory-Based Immune Network Optimization Algorithm
    Zhang, Ruirui
    Li, Tao
    Xiao, Xin
    Shi, Yuanquan
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [3] Artificial immune danger theory based model for network security evaluation
    Sun F.
    Journal of Networks, 2011, 6 (02) : 255 - 262
  • [4] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [5] Research on AMU Fault Detection Algorithm Based on Immune Danger Theory
    Zhou Dexin
    Fan Zhicheng
    Zhang Wenlin
    2011 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, 2011, : 1957 - 1961
  • [6] An Immune Algorithm Based on Danger Model
    Zhang, Chenggong
    Liu, Guisong
    Hu, Wang
    2008 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2008, : 468 - 473
  • [7] Adaptive Danger Area Based Danger Model Immune Algorithm
    Xu, Qingyang
    Meng, Xianyao
    Wang, Ning
    Zhang, Chuang
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 109 - +
  • [8] Danger Theory Based Micro Immune Optimization Algorithm Solving Probabilistic Constrained Optimization
    Zhang, Zhuhong
    Li, Lun
    Zhang, Renchong
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 103 - 107
  • [9] Rockbolts Detection Based on Immune Danger Theory
    Sun, Xiaoyun
    Zhao, Yang
    Zhang, Tianyuan
    Liu, Donghui
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 713 - 717
  • [10] Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes
    Jim, Lincy E.
    Islam, Nahina
    Gregory, Mark A.
    COMPUTERS & SECURITY, 2022, 113