Incorporation of Human Resistant System and Advance Network Security System to Improve Computer Secu

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 04 | Apr -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

Incorporation of Human Resistant System and Advance Network Security System to improve Computer Security Ajit Singh1 1 Assistant Professor, Computer Science Department , Jagran LakeCity University , MP, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract -

Numerous of the present security systems do not provide satisfactory level of protection aligned with everincreasing threats. The main reason for their collapse is the use of point solutions to protect hosts and reactive approach against intrusions. Here we studied and apply human immune system, which survives under dynamic changing conditions and provides protection against biological viruses and bacteria. By taking immune system as an analogy, we propose an end-to-end network security system using mobile agents with some mandate. Our solution not only overcomes limitations of traditional security solutions, but also enhances overall security by providing protection at each and every level of attack timeline. But the challenge in implementing such system is how to manage mobile agents in such a way that they are always acting as immune agents for our system. It functions in proactive and also reactive manner and has ability to learn and improve its strategies, equivalent to what human immune system does against viruses and bacteria.

Key Words: Intrusion Detection, Intrusion Response, Vulnerability Analysis, Mobile Agents, Immune System, Intrusion Deterrence. 1. INTRODUCTION Information systems are required to survive in different environments in order to continuously provide their services. They must be adaptable to different dynamic environments in order to provide reliable services. We have studied the systems that survive in nature in order to understand how to provide survivability to IT systems. One example of a natural system that survives in different dynamic environments is human immune system [3]. At the lowest level the human body consists of cells. These cells form tissues. The tissues combine to form organs and organs are combined to form complete systems, like immune, digestive, and reproductive system [4]. Cells in the immune system are produced by special areas in the body, like the thymus and the bone marrow [4]. There are different damaging agents (i.e. viruses, bacteria) that can destroy the body. But the immune system is able to identify, locate and remove these damaging agents what allows the body to survive and maintain itself for many Š 2017, IRJET

|

Impact Factor value: 5.181

years [4]. The immune system enables humans to survive in different environments[1]. Over the past few years research community and commercial product vendors came up with many solutions to protect network from intrusions: antivirus, firewall, spy-ware and authentication mechanism. These solutions still face the challenges of inherent system flaws, OS bugs, and social engineering attacks. Intrusion Detection Systems (IDS) fail to provide adequate protection due to the fact that they cannot detect and respond to all intrusions in real-time, because most of them require customization and human reaction by system administrators. It is very difficult for a system administrator to analyze large logs generated by network traffic, identify the attack, and respond in real-time. Traditional IDSs open a window of opportunity for attacker, because of the delay in attack identification and response by system administrators. The major drawback in all available solutions is their methodology of protection. First, the methodology is reactive: reaction starts when there is already an intrusion in progress. Second, there is no learning mechanism at a network level to study and learn about intrusions and provide protection against the same intrusion to the rest of the network[1]. Third, there are no preventive measures taken against foreseeable threats that can turn into intrusions based on existing vulnerabilities in the system, which become the cause of zero-day attacks. A number of researchers have applied the immune system features in securing information systems ([1][4], [5], [6]). The following features of the immune system are applied in information security systems: learning to detect new viruses; detecting viruses locally; identifying viruses; classifying and eliminating viruses autonomously; multiple layered protection system; different cells being able to detect different viruses and few ‘self’ cells being able to detect multiple viruses; and remembering discovered viruses. There is a need to revisit existing methodologies with an intension to improve them by applying the concept of immune system to achieve comprehensive security for information systems. In this paper we present the system that functions in six stages to secure information systems against intrusions. Our system is based on the concepts of prevention, deterrence, detection, response, and learning as similar as in human immune system. We used mobile |

ISO 9001:2008 Certified Journal | Page 601


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Incorporation of Human Resistant System and Advance Network Security System to Improve Computer Secu by IRJET Journal - Issuu