Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

被引:9
|
作者
Said, Wael [1 ,2 ]
Mostafa, Ayman Mohamed [1 ,3 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72314, Saudi Arabia
关键词
Immune system; Intrusion detection; Databases; Artificial intelligence; Heuristic algorithms; Clustering algorithms; Danger theory model; artificial immune system; negative selection algorithm; database intrusion detection system; NEGATIVE SELECTION ALGORITHM; INTRUSION DETECTION SYSTEM; DENDRITIC CELL ALGORITHM; NEURAL-NETWORKS; MODEL; AIS; CHALLENGES; SIGNAL; ATTACK;
D O I
10.1109/ACCESS.2020.3015399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusion detection systems are utilized to detect, as fast as possible, user's account privilege misuse when a prevention mechanism has failed to address such breaches. In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. The dynamic and more complex nature of cybersecurity, as well as the high false positive rate and high false negative percentage in current intrusion detection systems, are examples of such deficiency. In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system mechanisms. Experimental results for the implementation of the proposed algorithm provide a self-learning mechanism for achieving high detection coverage with a low false positive rate by using the signature of previously detected intrusions as detectors for the future detection process. The proposed algorithm can enhance detecting insider threats and eliminate data breaches by protecting confidentiality, ensuring integrity, and maintaining availability. To give an integrated picture, a comprehensive and informative survey for the different research directions that are related to the proposed algorithm is performed.
引用
收藏
页码:145332 / 145362
页数:31
相关论文
共 50 条
  • [31] A novel chaos danger model immune algorithm
    Xu, Qingyang
    Wang, Song
    Zhang, Li
    Liang, Ying
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (11) : 3046 - 3060
  • [32] "Danger: Security"! Securitization Theory and the Paris School of International Security Studies
    Gaidaev, O. S.
    MGIMO REVIEW OF INTERNATIONAL RELATIONS, 2022, 15 (01): : 7 - 37
  • [33] Parallel recommender algorithm based on immune theory
    Su, Yidan
    Wang, Yucai
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 52 - 55
  • [34] A Hybrid Algorithm for Enhanced Image Security Using Chaos and DNA theory
    Saranya, M. R.
    Mohan, Arun K.
    Anusudha, K.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
  • [35] Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness
    Sun, Feixian
    Wu, Zhigang
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 66 - +
  • [36] Design of an Immune-inspired Danger Theory Model Based on Fuzzy Set
    Fu Hai-Dong
    Li Gui-Feng
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, 2008, : 133 - 136
  • [37] Design of a four-layer IDS Model Based on Immune Danger Theory
    Yuan, Song
    Chen, Qi-juan
    Li, Peng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4502 - +
  • [38] Data Screening Algorithm of Power Grid Security Hidden Danger Based on Edge Computing
    Jiang, Jinxia
    Zhou, Hui
    Chen, Zhanjie
    Lv, Wei
    Geng, Jipu
    Journal of Multiple-Valued Logic and Soft Computing, 2024, 42 : 141 - 157
  • [39] Data Screening Algorithm of Power Grid Security Hidden Danger Based on Edge Computing
    Jiang, Jinxia
    Zhou, Hui
    Chen, Zhanjie
    Lv, Wei
    Geng, Jipu
    JOURNAL OF MULTIPLE-VALUED LOGIC AND SOFT COMPUTING, 2024, 42 (1-3) : 141 - 157
  • [40] Research on Database Security of E-Commerce Based on Hybrid Encryption
    Hou, Jinbiao
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 363 - 366