-
CiteScore
-
Impact Factor
Volume 2, Issue 3, ICCK Transactions on Emerging Topics in Artificial Intelligence
Volume 2, Issue 3, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Emerging Topics in Artificial Intelligence, Volume 2, Issue 3, 2025: 157-168

Open Access | Research Article | 28 August 2025
Immune-Inspired AI: Adaptive Defense Models for Intelligent Edge Environments
1 University of Colorado Boulder, Boulder, CO 80309, United States
* Corresponding Author: Anil Kumar Jonnalagadda, [email protected]
Received: 24 May 2025, Accepted: 18 July 2025, Published: 28 August 2025  
Abstract
The rapid expansion of edge computing and Internet of Things (IoT) ecosystems has introduced new cybersecurity challenges, particularly in decentralized, resource-constrained environments where traditional security models often fall short. This paper proposes an immune-inspired artificial intelligence framework (I3AI) that draws on core principles of biological immune systems including self-organization, local learning, and immune memory to enable adaptive, privacy-preserving defense mechanisms across distributed edge nodes. The architecture incorporates federated learning to maintain a decentralized threat intelligence network while ensuring data privacy and minimal communication overhead. I3AI was evaluated through large-scale simulations involving 10,000 virtual devices and tested in real-world deployments across varied geographic locations. Results demonstrated a 42% improvement in detection accuracy and a 53% reduction in false positives compared to baseline methods. Additionally, the framework achieved a 38% reduction in energy consumption for security operations. Notably, I3AI successfully identified 72% of simulated zero-day attacks within 24 hours, showcasing its adaptability to evolving threats. These outcomes underscore the potential of biologically-inspired AI to deliver scalable, efficient, and resilient cybersecurity for emerging edge environments, addressing key limitations of conventional centralized approaches.

Graphical Abstract
Immune-Inspired AI: Adaptive Defense Models for Intelligent Edge Environments

Keywords
artificial intelligence
edge computing
anomaly detection
immune systems
IoT
distributed learning

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Shandilya, S. K., Upadhyay, S., Kumar, A., & Nagar, A. K. (2022). AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis. Future Generation Computer Systems, 127, 297-308.
    [CrossRef]   [Google Scholar]
  2. Williams, P., Dutta, I. K., Daoud, H., & Bayoumi, M. (2022). A survey on security in internet of things with a focus on the impact of emerging technologies. Internet of Things, 19, 100564.
    [CrossRef]   [Google Scholar]
  3. Duru, C., Ladeji–Osias, J., Wandji, K., Otily, T., & Kone, R. (2022, June). A review of human immune inspired algorithms for intrusion detection systems. In 2022 IEEE World AI IoT Congress (AIIoT) (pp. 364-371). IEEE.
    [CrossRef]   [Google Scholar]
  4. Sabor, N., & Abo-Zahhad, M. (2021). Efficient Node Deployment Based on Immune-Inspired Computing Algorithm for Wireless Sensor Networks. In Nature-Inspired Computing for Smart Application Design (pp. 105-141). Singapore: Springer Singapore.
    [CrossRef]   [Google Scholar]
  5. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., & McLeod, J. (2003, September). Danger theory: The link between AIS and IDS?. In International conference on artificial immune systems (pp. 147-155). Berlin, Heidelberg: Springer Berlin Heidelberg.
    [CrossRef]   [Google Scholar]
  6. Wlodarczak, P. (2017, April). Cyber Immunity: A bio-inspired cyber defense system. In International Conference on Bioinformatics and Biomedical Engineering (pp. 199-208). Cham: Springer International Publishing.
    [CrossRef]   [Google Scholar]
  7. Myakala, P. K., Bura, C., & Jonnalagadda, A. K. (2025). Artificial immune systems: A bio-inspired paradigm for computational intelligence. Journal of Artificial Intelligence and Big Data, 5(1), 10-31586.
    [Google Scholar]
  8. Sela-Culang, I., Kunik, V., & Ofran, Y. (2013). The structural basis of antibody-antigen recognition. Frontiers in immunology, 4, 302.
    [CrossRef]   [Google Scholar]
  9. Song, J., Yuan, Y., & Pang, W. (2024, July). Sais: A novel bio-inspired artificial immune system based on symbiotic paradigm. In Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp. 2115-2118).
    [CrossRef]   [Google Scholar]
  10. Bollikonda, T. (2025). Emerging trends in artificial intelligence tools explainability and enterprise applications. Preprints.
    [CrossRef]   [Google Scholar]
  11. Raghukumar, H., Mahdavi, M., Cassity, A., Hatch, N., Santos, H., Arias, L., ... & Magnussen, W. (2024, May). Smart Communities, Smart Responders-Artificial Intelligence for Internet of Things Competition: A Case Study in Organizing a Public Safety Innovation Challenge. In 2024 IEEE World Forum on Public Safety Technology (WFPST) (pp. 114-119). IEEE.
    [CrossRef]   [Google Scholar]
  12. Canadian Centre for Cyber Security. (2024). Defending against distributed denial of service (DDoS) attacks – ITSM.80.110. Retrieved from \url{https://www.cyber.gc.ca/en/guidance/defending-against-distributed-denial-service-ddos-attacks-itsm80110
    [Google Scholar]
  13. Baker, K. (2025). Man in the Middle (MITM) Attack. Retrieved from \url{https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/man-in-the-middle-mitm-attack/
    [Google Scholar]
  14. NordLayer. (2025). What Is a Botnet? Definition, Types, and How to Prevent It. Retrieved from \url{https://nordlayer.com/learn/threats/botnet/
    [Google Scholar]
  15. Stanton, C., Katz, G., & Song, D. (2015). Isolation Forest for Anomaly Detection. Retrieved from \url{https://e3s-center.berkeley.edu/wp-content/uploads/2017/08/RET_CStanton-2015.pdf
    [Google Scholar]
  16. Suetor, C. G., Scrimieri, D., Qureshi, A., & Awan, I. U. (2025). An overview of distributed firewalls and controllers intended for mobile cloud computing. Applied Sciences, 15(4), 1931.
    [CrossRef]   [Google Scholar]
  17. Kamatala, S. (2024). AI agents and LLMs revolutionizing the future of intelligent systems. International Journal of Scientific Research and Engineering Development, 7(6).
    [CrossRef]   [Google Scholar]
  18. Packetlabs. (2023). What is a False Negative in Cybersecurity? Retrieved from \url{https://www.packetlabs.net/posts/what-is-a-false-positive-vulnerability/
    [Google Scholar]
  19. Jonnalagadda, A. K., Myakala, P. K., & Bura, C. (2025). The AI trifecta: Revolutionizing innovation across disciplines. Available at SSRN 5111809.
    [CrossRef]   [Google Scholar]
  20. Elhaj, M. M. K., Hamrawi, H., & Suliman, M. M. A. (2013). A multi-layer network defense system using artificial immune system. In 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE) (pp. 232–236).
    [Google Scholar]
  21. Halabi, T. (2021, December). Adaptive security risk mitigation in edge computing: Randomized defense meets prospect theory. In 2021 IEEE/ACM Symposium on Edge Computing (SEC) (pp. 432-437). IEEE.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Jonnalagadda, A. K., & Bura, C. (2025). Immune-Inspired AI: Adaptive Defense Models for Intelligent Edge Environments. ICCK Transactions on Emerging Topics in Artificial Intelligence, 2(3), 157–168. https://doi.org/10.62762/TETAI.2025.270695

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 183
PDF Downloads: 36

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Emerging Topics in Artificial Intelligence

ICCK Transactions on Emerging Topics in Artificial Intelligence

ISSN: 3068-6652 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/