2019
DOI: 10.14569/ijacsa.2019.0101024
|View full text |Cite
|
Sign up to set email alerts
|

An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems

Abstract: The immune system has received a special attention as a potential source of inspiration for innovative approaches to solve database security issues and build artificial immune systems. Database security issues need to be correctly identified to ensure that suitable responses are taken. This paper proposes an immunity-based error containment algorithm for providing optimum response in detected intrusions. The objective of the proposed algorithm is to reduce the false positive alarms to the minimum since not all… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…On the other hand, if the enforcement of cm j definitely enhances the effects generated by the enforcement of cm i , one says that the countermeasures are perfectly combinable. In this case, the combined benefit B of the enforcement of cm i and cm j can be defined as the sum of the single benefit of those countermeasures limited by the maximum possible value of this parameter (i.e., 10), as reported in Equation 12: B({cm i , cm j }) = min(B(cm i ) + B(cm j ), 10) if cm i , cm j are perfectly combinable (12) This condition expresses the best possible combination, so the combined value illustrated in Equation 12determines the upper bound of the combined value of two countermeasures.…”
Section: B Countermeasure Benefitmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, if the enforcement of cm j definitely enhances the effects generated by the enforcement of cm i , one says that the countermeasures are perfectly combinable. In this case, the combined benefit B of the enforcement of cm i and cm j can be defined as the sum of the single benefit of those countermeasures limited by the maximum possible value of this parameter (i.e., 10), as reported in Equation 12: B({cm i , cm j }) = min(B(cm i ) + B(cm j ), 10) if cm i , cm j are perfectly combinable (12) This condition expresses the best possible combination, so the combined value illustrated in Equation 12determines the upper bound of the combined value of two countermeasures.…”
Section: B Countermeasure Benefitmentioning
confidence: 99%
“…Among those, AIS have been proved to comprise a promising paradigm in different areas of the cybersecurity ecosystem [12]. Specifically, such a bio-inspired technique aims to emulate the biological immune system's behavior in various applications of computer science.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [122] introduce an integrated solution for securing databases based on three sequential processes of security. The first process is presented in [121] to detect and prevent malicious intruders using the inspiration of the negative selection mechanism and DT model.…”
Section: Immune Inspired Database Intrusion Detectionmentioning
confidence: 99%