Bioinspired Immune System for Intrusions Detection System in Self Configurable Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
In the last couple of years, the computer frameworks have become more vulnerable to external attacks. The PC security has become the prime cause of concern for every organization. To achieve this objective Intrusion Detection System (IDS) in self-configurable networks has played a vital role in the last few decades to guard LANs. In this work, an IDS in self-configurable networks is deployed based on Bioinspired Immune System. IDS in self-configurable networks are accustomed to monitor data and network activity and alert when any suspicious activity observed security heads are alerted. A vital and common application space for versatile frameworks swarm-based is that of PC security. A PC security framework ought to protect a machine or accumulation of machines from unapproved gatecrashers. The framework seems to be capable of counteracting against external activity. Also it is comparable in usefulness to secure framework shielding from intrusion by external threats like in case of attacking microorganisms. A counterfeit insusceptible framework is a PC programming framework that mirrors a few sections of the conduct of the human resistant framework to shield PC systems from infections and comparable digital assaults. This paper demonstrates the need of a novice substring seeks calculation based on bio-roused calculations. Tests are required to create system for Network Intrusion detection that aids in securing a machine or clusters of machines from unapproved intruders. In this paper IDS in self-configurable networks is implemented by using Bio-inspired Immune System and KMP algorithm as a model IDS.
Authors and Affiliations
Noor Mohd, Annapurna Singh, H. S. Bhadauria
Novel Causality in Consumer’s Online Behavior: Ecommerce Success Model
Online shopping (e-Shopping) has grown at a rapid pace with the advancement in modern web technologies, there are then socio and technical aspects (factors) in the mentioned e-shopping. The following research paper highl...
Microcontroller-based RFID, GSM and GPS for Motorcycle Security System
The crime level including motorcycle theft has been increasing. It occurs regardless the time and place. The owner of the motorcycle needs to ensure the security of his motorcycle by adding either manual or electronic lo...
Estimation Method of Ionospheric TEC Distribution using Single Frequency Measurements of GPS Signals
The satellite-to-ground communications are influenced by ionospheric plasma which varies depending on solar and geomagnetic activities as well as regions and local times. With the expansion of use of the space, continuou...
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
Cryptography and cryptanalysis are in ever-lasting struggle. As the encryption techniques advance, the cryptanalysis techniques advance as well. To properly face the great danger of the cryptanalysis techniques, we shoul...
The Use of Programming Languages on the Final Project Report by Using Analytical Hierarchy Process (AHP)
The development in information technology provides a lot of convenience for everyone. Academy of Information Management and Computer (AIMC) students of the fourth semester, implementing the Job Training must specify the...