Research Article

Securing Relational Databases with an Artificial Immunity Features

by  Ayman Mohamed Mostafa, Mohamed H. Abdel-Aziz, Ibrahim M. El-Henawy
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Issue 4
Published: April 2013
Authors: Ayman Mohamed Mostafa, Mohamed H. Abdel-Aziz, Ibrahim M. El-Henawy
10.5120/11566-6861
PDF

Ayman Mohamed Mostafa, Mohamed H. Abdel-Aziz, Ibrahim M. El-Henawy . Securing Relational Databases with an Artificial Immunity Features. International Journal of Computer Applications. 68, 4 (April 2013), 11-16. DOI=10.5120/11566-6861

                        @article{ 10.5120/11566-6861,
                        author  = { Ayman Mohamed Mostafa,Mohamed H. Abdel-Aziz,Ibrahim M. El-Henawy },
                        title   = { Securing Relational Databases with an Artificial Immunity Features },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 68 },
                        number  = { 4 },
                        pages   = { 11-16 },
                        doi     = { 10.5120/11566-6861 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Ayman Mohamed Mostafa
                        %A Mohamed H. Abdel-Aziz
                        %A Ibrahim M. El-Henawy
                        %T Securing Relational Databases with an Artificial Immunity Features%T 
                        %J International Journal of Computer Applications
                        %V 68
                        %N 4
                        %P 11-16
                        %R 10.5120/11566-6861
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Database security is considered one of the major computer science research trends because of its importance in maintaining the privacy, integrity, and confidentiality of data. Human immune system is a set of defense mechanisms that can be used to defend the body against diseases caused by pathogens. Artificial immune system is the artificial simulation of human immunity that can be applied to computer security applications. The main goal of this paper is to develop a database security system based on danger theory. Danger theory is one of the most recent algorithms of artificial immunity that can provide interactive features for securing relational databases. By merging the developed features of artificial immunity to the security system, the secrecy of the database can be maintained.

References
  • Dasgupta, D. , Ya, S. , and Nino, F. , "Recent Advances in Artificial Immune Systems: Models and Applications," International Journal of Applied Soft Computing, ELSEVIER, 2011
  • Ming Ou, C. , "Host-based Intrusion Detection Systems Adapted from Agent-based Artificial Immune Systems," International Journal of Neurocomputing, ELSEVIER, 2012
  • Ji, Z. , and Dasgupta, D. , "Revisiting Negative Selection Algorithms," International Journal of Evolutionary Computation, Massachusetts Institute of Technology, 2007
  • Forrest, S. , Perelson, A. , Allen, L. , and Cherukuri, R. , "Self-Nonself Discrimination in a Computer," IEEE Symposium on Research in Security and Privacy, 1994
  • Hashem, M. , El-Henawy, I. , and Mostafa, A. , "Interactive Multi-Layer Policies for Securing Relational Databases," IEEE International Conference on Information Society, UK, 2012
  • Hosseinpour, F. , Abu Bakar, K. , Hardoroudi, A. , and Kazazi, N. , "Survey on artificial immune system as a bio-inspired technique for anomaly based intrusion detection system," IEEE International Conference on Intelligent Networking and Collaborative Systems, 2010
  • Hashem, M. , El-Henawy, I. , and Mostafa, A. , "Design and Implementation of Multi-Layer Policies for Database Security," International Conference on Security and Management, USA, 2012
  • Mostafa, A. , Hashem, M. , and El-Henawy, I. , "Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases," International Journal of Digital Content Technology and its Applications JDCTA, ELSEVIER, 2013
  • Stibor, T. , Mohr, Ph. , and Timmis, J. , "Is Negative Selection Appropriate for Anomaly Detection?," ACM International Conference on Generic and Evolutionary Computation, 2005
  • Luo, W. , Wang, X. , Tan, Y. , and Wang, X. , "A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for each Detector," 9th International Conference on Parallel Problem Solving from Nature, Springer, 2006
  • Luo, W. , Wang, J. , and Wang, X. , "Evolutionary negative selection algorithms for anomaly detection," 8th International Conference on Information Sciences, 2005
  • J. Timmis, J. , Neal, M. , and Hunt, J. , "An artificial immune system for data analysis," International Journal of Biosystems, ELSEVIER, 2000
  • Zhang, C. , and Yi, Z. , "An Artificial Immune Network Model Applied to Data Clustering and Classification," 4th International Conference on Neural Networks, Springer, 2007
  • de Castro, L. N. , and Von Zuben, F. J. , "Learning and optimization using the clonal selection principle," IEEE Transactions on Evolutionary Computations, 2002
  • Al-Enezi, J. R. , Abbod, M. F. , and Alsharhan, S. , "Artificial Immune Systems- models, Algorithms, and Applications," International Journal of Research and Reviews in Applied Sciences, 2010
  • Coelho, G. P, and Zuben, F. J. V. , "Omni-aiNet: An Immune-inspired Approach for Omni-optimization," 5th International Conference on Artificial Immune Systems, Springer, 2006
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Database security artificial immune system danger theory

Powered by PhDFocusTM