Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

被引:9
|
作者
Said, Wael [1 ,2 ]
Mostafa, Ayman Mohamed [1 ,3 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72314, Saudi Arabia
关键词
Immune system; Intrusion detection; Databases; Artificial intelligence; Heuristic algorithms; Clustering algorithms; Danger theory model; artificial immune system; negative selection algorithm; database intrusion detection system; NEGATIVE SELECTION ALGORITHM; INTRUSION DETECTION SYSTEM; DENDRITIC CELL ALGORITHM; NEURAL-NETWORKS; MODEL; AIS; CHALLENGES; SIGNAL; ATTACK;
D O I
10.1109/ACCESS.2020.3015399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusion detection systems are utilized to detect, as fast as possible, user's account privilege misuse when a prevention mechanism has failed to address such breaches. In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. The dynamic and more complex nature of cybersecurity, as well as the high false positive rate and high false negative percentage in current intrusion detection systems, are examples of such deficiency. In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system mechanisms. Experimental results for the implementation of the proposed algorithm provide a self-learning mechanism for achieving high detection coverage with a low false positive rate by using the signature of previously detected intrusions as detectors for the future detection process. The proposed algorithm can enhance detecting insider threats and eliminate data breaches by protecting confidentiality, ensuring integrity, and maintaining availability. To give an integrated picture, a comprehensive and informative survey for the different research directions that are related to the proposed algorithm is performed.
引用
收藏
页码:145332 / 145362
页数:31
相关论文
共 50 条
  • [41] A security constrained unit commitment model based on immune algorithm
    Wang, Minwei
    Yang, Li
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2010, 34 (22): : 57 - 61
  • [42] Image Segmentation Based On A Hybrid Immune Memetic Algorithm
    Ma, Wenping
    Huang, Yuanyuan
    Li, Congling
    Liu, Jing
    2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [43] Hybrid Clustering Algorithm Based on the Artificial Immune Principle
    Zhou, Yan
    Hu, Zhifeng
    ADVANCED INTELLIGENT COMPUTING, 2011, 6838 : 40 - 46
  • [44] A Novel Immune Danger Algorithm for Constrained Multiobjective Optimization
    Lu, Hong
    2013 25TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2013, : 4426 - 4429
  • [45] Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security
    Sujatha, R.
    Ramakrishnan, M.
    Duraipandian, N.
    Ramakrishnan, B.
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2015, 105 (01): : 47 - 68
  • [46] Optimal adaptive genetic algorithm based hybrid signcryption algorithm for information security
    Sujatha, R.
    Ramakrishnan, M.
    Duraipandian, N.
    Ramakrishnan, B.
    CMES - Computer Modeling in Engineering and Sciences, 2015, 105 (01): : 47 - 68
  • [47] TOWARDS A THEORY OF INTERNATIONAL SECURITY
    BELLANY, I
    POLITICAL STUDIES, 1981, 29 (01) : 100 - 105
  • [48] Towards a security benchmark for database management systems
    Vieira, M
    Madeira, H
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 592 - 601
  • [49] Effect of Learning and Database in Robustness of Security Tools Based on Immune System Modeling
    Banirostam, Touraj
    Fesharaki, Mehdi N.
    UKSIM FIFTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2011), 2011, : 47 - 52
  • [50] Symmetry Theory Based Classification Algorithm in CT Image Database
    Rong Jing-Shi
    Pan Hai-Wei
    Gao Lin-Lin
    Han Qi-Long
    Feng Xiao-Ning
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 698 - 702