Journal of Information Security and Applications 35 (2017) 138–159 Contents lists available at ScienceDirect Journal of Information Security and Applications journal homepage: www.elsevier.com/locate/jisa Applications of artificial immune systems to computer security: A survey Diogo A.B. Fernandes , Mário M. Freire, Paulo A.P. Fazendeiro, Pedro R.M. Inácio Instituto de Telecomunicações, Department of Computer Science, University of Beira Interior, Rua Marquês d’Ávila e Bolama, 6201-001 Covilhã, Portugal a r t i c l e i n f o Article history: Keywords: Artificial immune systems Nature-inspired computing Security Survey a b s t r a c t For the last two decades, artificial immune systems have been studied in various fields of knowledge. They were shown to be particularly effective tools at detecting anomalous behavior in the security domain of computer systems. This article introduces the principles of artificial immune systems and surveys several works applying such systems to computer security problems. The works herein discussed are summarized and open issues are pointed out afterwards, elaborating on a novel applicability of these systems to cloud computing environments. © 2017 Elsevier Ltd. All rights reserved. 1. Introduction Nature has crafty ways to solve problems. The knowledge retrieved from its observation has been a source of inspiration for computer scientists throughout the years, which aim to derive solutions for problems that may be otherwise hard or impossible to solve with other methods, possibly having higher computa- tional complexity. In the cases where analytic expressions are not available, nature-inspired computing may be able to find sub- optimal solutions efficiently. Nature-inspired algorithms abstract the phenomena found in the wild and are subject to evolutionary steps or computing layers in order to converge to a solution. Examples include Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Artificial Neural Networks (ANNs) and Artificial Immune Systems (AISs). AISs abstract many theories of the biological immune system, which is not fully understood to this date. The immune system has the responsibility of protecting the body from foreign and potentially dangerous microorganisms called pathogens. To fight them off, the immune system has developed the innate and the adaptive immune subsystems. The translation of the immune system to the computing realm seems to be contextually correct and particularly suited for security purposes. The seminal works of Forrest et al. [1] and Kephart [2], in 1994, for the detection of malware underline that view. One of the best things about the immune system is that it is capable of distributively detecting a vast number of unknown pat- Corresponding author. E-mail addresses: dfernandes@penhas.di.ubi, diogoabfernandes@gmail.com (D.A.B. Fernandes), mario@di.ubi.pt (M.M. Freire), pandre@di.ubi.pt (P.A.P. Fazen- deiro), inacio@di.ubi.pt (P.R.M. Inácio). terns using limited body resources. The ability to retain memory is also a key feature of the immune system, allowing faster responses to be triggered for pathogens that has encountered before. This behavior has distinct applications in computer security, specifically in the detection of anomalies in networks or computers. AISs are modeled with positive or negative samples so that nonself (anomalous object(s)) is distinguished from self, the set character- izing normalcy of the monitored system. Research on information and network security, particularly with the purpose of detecting security incidents, can be broken up according to different criteria. For example, one can consider deployment, purpose or scope of security solutions for such classification. For deployment and scope, systems built either for hosts, network or applications can be characterized under distinct topics. Fig. 1 depicts five of those topics, namely malicious process detection, anomaly detection, intrusion detection, scan and flood detection, and fraud detection. Whereas the detection of malicious processes is done at the host level, detection of intrusions, scans or floods is a problem ad- dressed at network points. Studies under fraud detection analyze subjects such as spam and phishing, thereby conveying the more broad meaning of the art of deception. Anomaly detection refers to more generic works that attempt to provide all-in-one, agnostic solutions for the detection of abnormality. The topics illustrated in Fig. 1 are later used for organizing this survey on AISs in Section 5. These topics cover the subjects of the related works while segregating them in a consistent manner. Various works [3–13] published throughout the time have re- viewed the field of AISs to some extent, elaborating on the theory behind AIS algorithms or gathering works on a specific topic. The goal of this article is to give an introductory view on the subject and systematically review much of the works available in the literature, considering the identification of future guidelines in the http://dx.doi.org/10.1016/j.jisa.2017.06.007 2214-2126/© 2017 Elsevier Ltd. All rights reserved.