International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.8, No.3, Mar. 2016

Immune-Inspired Self-Protection Model for Securing Grid

Full Text (PDF, 373KB), PP.75-84

Views:72   Downloads:1


Inderpreet Chopra, Ratinder Kaur

Index Terms

DDoS;Immune System;Security;Snort;Globus


The application of human immunology in solving security problems in Grid Computing seems to be a thought-provoking research area. Grid involves large number of dynamic heterogeneous resources. Manually managing the security for such dynamic system is always fault prone. This paper presents the simple immune based model for self-protection (SIMS) of grid environment from various attacks like DoS, DDoS, Probing, etc. Like human body helps to identify and respond to harmful pathogens that it doesn't recognize as "self", in the same manner SIMS incorporates the immunological concepts and principles for safeguarding the grid from various security breaches.

Cite This Paper

Inderpreet Chopra, Ratinder Kaur,"Immune-Inspired Self-Protection Model for Securing Grid", International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.3, pp.75-84, 2016. DOI: 10.5815/ijitcs.2016.03.09


[1]Fran Berman, Geoffrey Fox and Tony Hey, “The Grid- past, present, future, Grid Computing Making the Global Infrastructure a Reality,” John Wiley & Son, 2003.

[2]L. Ramakrishnan, “Securing Next Generation Grids,” IT Pro, IEEE Computer Society, 2004, pp. 34-39.

[3]I. Chopra and M.Singh, “Agent based Self-Healing System for Grid Computing,” ICWET, ACM, Feb 2010, pp. 31-35.

[4]Alan Ganek, “Overview of Autonomic Computing: Origins, Evolution, Direction,” CRC Press, 2004, pp. 3-18.

[5]Jeffrey O. Kephart and David M. Chess, “The Vision of Autonomic Computing,” IEEE Computer, 2003. Pp.41-50.

[6]Hang Guo, Ji Gao, Periyou Zhu and Fan Zhang, “A Self-Organized Model of Agent Enabling Autonomic Computing for Grid Environment,” 6th Word Congress on Inteligent Control, 2006, pp.2623-2627.

[7]Benoit Claudel, Noel De Palma, Renaud Lachaize and Daniel Hagimont, “Self-protection for Distributed Component-Based Applications,” Springer-Verlag Berlin Heidelberg, 2006, pp.184-198.

[8]Christian Kreibich and Jon Crowcroft, “Honeycomb - Creating Intrusion Detection Signatures Using Honeypots”, ACM SIGCOMM, January 2004, pp.51-56.

[9]Anirban Chakrabarti, “Grid Computing Security”, Springer, Ch-6, 2007 pp105.


[11]I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, “A Security Architecture for Computational Grids”, 5th ACM Conference on Computer and Communications Security, 1998, pp. 83-92.

[12]S. Kenny and B. Coghlan, “Towards a Grid-Wide Intrusion Detection System”, Advances in Grid Computing, Springer, 2005, pp. 275-284.

[13]A. Schulter, F. Navarro, F. Koch, and C.Westphall, “Towards Grid based Intrusion Detection”, Network Operations and Management Symposium, NOMS, 10th IEEE/IFIP, 2006, pp. 1-4.

[14]Michal Witold Jarmo lkowicz, “A Grid-aware Intrusion Detection System”, Technical University of Denmark, IMM-THESIS, 2007.

[15]Fang-Yie Leu, Ming-Chang Li and Jia-Chun Lin, “Intrusion Detection based on Grid”, ICCGI, 2006, pp. 62-68.

[16]Michael P. Brennan,”Using Snort For a Distributed Intrusion Detection System”, SANS Institute 2002, pp. 1-12.

[17]Hassen Sallay, Khalid A. AlShalfan and Ouissem Ben Fred j, “A scalable distributed IDS Architecture for High speed Networks”, IJCSNS, VOL.9 No.8, August 2009, pp. 9-16.

[18]Yasir Abdelgadir Mohamed and Azween B. Abdullah, “Immune Inspired Framework for securing Hybrid MANET”, IEEE Symposium on Industrial Electronics and Applications (ISIEA), October 2009, pp301-306.

[19]Youngzhong Li, Rushan Wang and Jing Xu, “A Novel Distributed Intrusion Detection Model Based on Immune Mobile Agent”, International Symposium on Web Information Systems and Applications (WISA), May 22-24, 2009, pp.72-75.

[20]Zhang Quing-hua, Zhang Ya-she,Shao Long-qui and, “An Immunity Based Technical Research Into Network Intrusion Detection”, International Conference on Computer Science and Software Engineering,  2008, pp. 955-958.

[21]R Ananthanarayan and C.K.J. Paniker, “Textbook of Microbiology”, 6th ed, Orient Longman, 2000.

[22]Carranza and Newman, “Clinical Periodontology”, 8th ed, Harcourt India Pvt Ltd, pp118, 2001.

[23]Globus Alliance, “A Globus Primer: Describing Globus Toolkit Version 4”, http:/, 2008.

[24]M. Feller and I. Foster and S. Martin, “GT4 GRAM: A Functionality and Performance Study”, 2008.

[25]Ruben S. Montero, “The GridWay Meta-Scheduler”, Open Source Grid and Cluster, Oakland, CA, May 2008.

[26]Data Management: Key Concepts, Grid FTP, http:/, 2008.

[27]Erin Cody, Raj Sharman, Raghav H. Rao and Shambhu Upadhyaya, “Security in grid computing: A review and synthesis”, Decision Support Systems, 2008, pp749-764 .

[28]A.Bendahmane, M.Essaaid i, A.El Moussaoui and A.Younes, “Grid Computing Security Mechanisms: State-of-The-Art”, Support Systems, Multimedia Computing and Systems, ICMCS '09, 2009, 535 - 540.

[29]A. Chien, B. Calder and S. Elder, “ENTROPIA: architecture and performance for an Enterprise desktop grid system”, Journal of Parallel and Distributed Computing 2003, pp597-610.

[30]F. Kon, M. Roman and P. Liu, “Monitoring, security and dynamic configuration with the dynamic TAO reactive ORB”, IFIP/ACM International Conference on Distributed Systems Platforms, New York, United States 2000, pp. 121-143.

[31]M.F. Tolba, M.S. Abdel-Wahab, LA. Taha and A.M. Al-Shishtawy, “GIDA: Toward Enabling Grid Intrusion Detection System”, Proc. Conference on Cluster Computing and Grid (CCGrid), Cardiff (Wales), 2005, pp.1-3.

[32]Oracle 10g database, based intrusion detection-paper 1205.pdf, 2006.

[33]T. Ryutov, C. Neumann and L. Zhou, “Integrated Access Control and Intrusion Detection (IACID) Framework for Secure Grid Computing”, Tech. Report., University of Southern California, 2005.

[34]K. Hwang, M. Cai and Y. Chen, “Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes”, IEEE Transactions on Dependable and Secure Computing, Vol. 4, No. 1, January-March, 2007, pp.41-55.

[35]J. Balthrop, S. Forrest and M. R. Glickman, Revisiting “LISYS: Parameters and Normal Behavior”, Proceedings of the 2002 Congress on Evolutionary Computation, CEC, 2002, pp.1045-1050.

[36]Chung-Ming Ou, “Host-based intrusion detection systems adapted from agent-based artificial immune systems”, Neurocomputing, vol 88, 2012, pp78–86.

[37]P. Varalakshmi and S. Tharmarai Selvi, “Thwarting DDoS attacks in grid using information divergence”, Future Generation of Computer Systems, 2013, pp429-441.

[38]Chandrashekhar Azad, Vijay Kumar Jha, “Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets”, I.J. Information Technology and Computer Science, 2013, pp.75-90.

[39]Muhammad Aamir, Muhammad Arif, “Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense”, I.J. Information Technology and Computer Science, 2013, 08, pp.54-65.

[40]Sutapa Sarkar, Brindha.M, “High Performance Network Security Using NIDS Approach”, I.J. Information Technology and Computer Science, 2014, 07, pp. 47-55.