You are on page 1of 14

ARTIFICIAL

IMMUNE
NETWORK
SECURITY
SYSTEM
DONE BY:
ANU.K -8
DEEPAK.K.V -21
SHABIN JAYARAJ.S -54
GUIDED BY: SHOBHANA N V
INTRODUCTION

In this project we are trying to implement an artificial


immune network security system. Therefore, the artificial
immune network security system is equipped with the same
attributes as the human immune system.

The behaviors are:


 Unsupervised/Autonomous
 Decentralized/Distributed
 Adaptive
 Efficient
MOTIVATION & OBJECTIVES

The objective of the project is to build a Java-based


intrusion detection system that autonomously scans the file
system for virus detection in local network. The AIS system
includes an artificial cell which scan the defined threats in each
active system. Its design is such that it overcomes the drawback
of centralized network intrusion detection.
EXISTING SYSTEM

Intrusion Detection Systems (IDS) protect a network


against intrusions. Two different types of IDS:
•NIDS are normally a server which check the network traffic
which are routed over this server. Normally, NIDS are
supervised by an Administrator.
•HIDS are installed on each node and can be described as a
small NIDS. Normally, the HIDS work unsupervised.

There exist also the combination of NIDS and HIDS. This


is called Network Node Intrusion Detection System.
The demerits are:
• Supervised
• Centralized
RELATED WORKS

•Snort is a free and open source NIDS that has the ability to
perform real-time traffic analysis and packet logging on IP
networks. Snort performs protocol analysis, content searching,
and content matching.
•Bro is an open-source, Unix-based NIDS that passively
monitors network traffic and looks for suspicious activity.
•OSSEC is a free, open source HIDS It performs log analysis,
integrity checking, Windows registry monitoring, rootkit
detection, time-based alerting and active response.
•Samhain HIDS provides file integrity checking and log file
monitoring/analysis, as well as rootkit detection, port
monitoring, detection of rogue SUID executables, and hidden
processes.
PROPOSED SYSTEM

The aim is to find threats by scanning files that are


transferred. That is, it continuously checks the user files while
they are uploaded or downloaded. The server automatically
finds threats whenever the file is uploaded or downloaded in
the current server.
Services provided:
1.Upload File:This service includes the user to upload their
files to the server.
2.Download File:This service includes user can view,
download, delete their file from the server.
3.Threat Update: This service includes to register new known
threats , edit and delete existing threats.
4.Exit:Using this option the user can exit from the system.
DESIGN – SCHEMA
DIAGRAM
AIS WINDOW SPLASH SCREEN
FILE THREAT
DOWNLOAD FOUND DELETE
UPLOAD THREAT THREAT/
FILE NOT FOUND RESUME
ARTIFICIAL
SCAN
CELL SCANS
EXIT UPLOAD/
DOWNLOAD
EDIT
THREAT
THREAT REGISTER AIS
UPDATE NEW DATABAS
THREAT E
DELETE
THREAT
EXIT
DESIGN – DFD
DEVELOPMENT TECHNOLOGY
• The artificial immune system provides the functionality
that the artificial cell can perform all required tasks:
accessing system-files, checking of packets, communication
between agents, etc.
• This environment also shares the computational power
over all artificial cells .
• The local cell communication is realized using a Status
Storage in each node.
• There is a packet-evaluator which evaluates if a packet
contains an attack or not.
• In Intrusion Detection, a dataset describes how intrusions
can be detected.
• In the signature-based approach, the description is a
string/pattern for each intrusion.
HARDWARE AND SOFTWARE
• Hardware Requirements
Server Client
Processor: Pentium 4 Pentium 4
Processor Speed: 1 GHz 1 GHz
RAM Capacity: 512 MB 256 MB
Hard disk: 40GB 40 GB
Monitor: 15’’SVGA 15’’SVGA
• Software Requirements
Operating System : Windows XP/2000
Platform : JAVA IDE
Front End : JAVA
Back End : MySQL
Code Behind : JAVA
APPLICATION
• The AIS is an enhancement of current NIDS. AIS runs on
each node, e.g. Router, Switches, Personal Computers (PC),
Producing-Servers, etc.
• The NIDS check each packet which is routed over it. With
the right placement of a NIDS it identifies lots of attacks.
• But there exist situations when the NIDS cannot identify an
attack, e.g. the packet is not routed over the NIDS or the
NIDS is overloaded.
• In such cases, AIS will protect the nodes because it protects
each node and shares the computational power over all
nodes.
• AIS cooperates with NIDS.
• AIS replaces current HIDS because they are too static and
adapts too slowly to the current situation in the network.
CONCLUSION
The system is developed for finding threats in distributed
systems. So the main aim is to find threats by scanning files that
is either uploaded or downloaded. For that, our system is
sharing more than one server.
That is, it continuously checks the user files while they are
uploaded or downloaded. Using this software we can upload
and download the files to and from the server. The server
automatically finds threats whenever the file is loaded or
downloaded in the current server.
FUTURE WORKS
• Use the artificial Cells and the artificial Cell
Communication in order to build up a self-management of
AIS.
• The goal is to increase the Network Security and to receive
a Guarantee of a certain Security( by defending worms and
hackers).
• Add more realistic Scenarios and model different Attack-
Types.
• Currently, it is necessary to edit source code in order to
define a new scenario. For the future, it would be nice to
have a construction-kit for scenario-definition.
>>>>>>THANK You.

You might also like