Computer science has always mixed the concepts of biology and computers to enhance the way in which systems are designed. Artificial Immune System (AIS) is a Computational Intelligence strategy dependent on an organically enlivened computational system that can be utilized for taking care of complex computational issues. It tends to be seen that AIS is an incredibly various locale of research, going from the modeling immune systems to complex algorithms for specific applications. This paper exhibits an exhaustive survey of different frameworks developed in the artificial immune system and its application. Reviews of frameworks in AIS are uncommon and henceforth this paper gives an inside out audit of progressing research and challenges in AIS. We start by presenting AIS and give a thorough survey of different systems in AIS and its application in anomaly detection. We investigate the utilization of AIS in the Intrusion Detection System named the Cyber Immune System(CIS) and compares various AIS works applied to CIS. We conclude with various future extensions in the area of AIS research.
Intrusion detection system is used to monitor the system and network activities to identify anomalies and attacks so that integrity, availability, and confidentiality can be preserved. Here an intrusion detection system based on Artificial Immune System is proposed based on Natural Killer (NK) cells with immunological memory. NK cells are created and each NK cells detection radius is determined using the negative selection algorithm and is trained to detect various attacks. Effective cells with high fairness values are proliferated and distributed to the network using clonal selection algorithm. In this paper, two types of NK cell are used-a Heavyweight NK cell (HWNK) and a number of Lightweight NK cells (LWNK). The incoming data is vectorized and Major Histocompatibility Complex Class I (MHC1) is created. Then based on this MHC1, any of the receptors i.e. Activating Receptor or Inhibiting Receptor is activated. If it is the signature of an attack, Activating Receptor is activated. Activating receptor activation results in either cytokine release or apoptosis. Here cytokine release means an alarm is generated informing the administrator and apoptosis stands for dropping of the packet. If Inhibiting Receptor is activated, it’s a normal packet there is no action taken. The technique proposed yields high accuracy, better detection rate and quick response time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.