Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory

In this paper, software system, design theories and human immune system (HIS) features are used to introduce a novel algorithm for the problem of preventing intrusions and healing the damage which they cause. The HIS features are analyzed and modelled to monitor network systems as to whether th...

Full description

Bibliographic Details
Main Authors: Muna, Elsadig, Azween, Abdullah
Format: Conference or Workshop Item
Language:English
Published: 2010
Subjects:
Online Access:http://scholars.utp.edu.my/id/eprint/2291/
http://scholars.utp.edu.my/id/eprint/2291/1/getPDF.pdf
_version_ 1848659225425739776
author Muna, Elsadig
Azween, Abdullah
author_facet Muna, Elsadig
Azween, Abdullah
author_sort Muna, Elsadig
building UTP Institutional Repository
collection Online Access
description In this paper, software system, design theories and human immune system (HIS) features are used to introduce a novel algorithm for the problem of preventing intrusions and healing the damage which they cause. The HIS features are analyzed and modelled to monitor network systems as to whether the inline activities are behaving abnormally or being attacked. The abnormal activities are prevented and healed by the presented algorithms. We show how the use of biological immune systems, which incorporate an innate, adaptive immune system and self-healing mechanism, can reduce the number of false alerts and heal the damage caused by intrusion. This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self–Healing (SH) mechanism.
first_indexed 2025-11-13T07:27:03Z
format Conference or Workshop Item
id oai:scholars.utp.edu.my:2291
institution Universiti Teknologi Petronas
institution_category Local University
language English
last_indexed 2025-11-13T07:27:03Z
publishDate 2010
recordtype eprints
repository_type Digital Repository
spelling oai:scholars.utp.edu.my:22912017-01-19T08:24:53Z http://scholars.utp.edu.my/id/eprint/2291/ Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory Muna, Elsadig Azween, Abdullah QA75 Electronic computers. Computer science In this paper, software system, design theories and human immune system (HIS) features are used to introduce a novel algorithm for the problem of preventing intrusions and healing the damage which they cause. The HIS features are analyzed and modelled to monitor network systems as to whether the inline activities are behaving abnormally or being attacked. The abnormal activities are prevented and healed by the presented algorithms. We show how the use of biological immune systems, which incorporate an innate, adaptive immune system and self-healing mechanism, can reduce the number of false alerts and heal the damage caused by intrusion. This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self–Healing (SH) mechanism. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/2291/1/getPDF.pdf Muna, Elsadig and Azween, Abdullah (2010) Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory. In: 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010, Singapore.
spellingShingle QA75 Electronic computers. Computer science
Muna, Elsadig
Azween, Abdullah
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
title Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
title_full Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
title_fullStr Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
title_full_unstemmed Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
title_short Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
title_sort intrusion prevention and self-healing algorithms inspired by danger theory
topic QA75 Electronic computers. Computer science
url http://scholars.utp.edu.my/id/eprint/2291/
http://scholars.utp.edu.my/id/eprint/2291/1/getPDF.pdf