Skip to main content

An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks

  • Conference paper
Computational Intelligence and Security (CIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Included in the following conference series:

Abstract

Many single points of failure exist in an intrusion detection system (IDS) based on a hierarchical architecture that does not have redundant communication lines and the capability to dynamically reconfigure relationships in the case of failure of key components. To solve this problem, we propose an IDS inspired by the human immune system based upon several mobile agents. The mobile agents act similarly to white blood cells of the immune system and travel from host to host in the network to detect any intrusions. As in the immune system, intrusions are detected by distinguishing between "self" and "non-self", or normal and abnormal process behavior respectively. In this paper we present our model, and show how mobile agent and artificial immune paradigms can be used to design efficient intrusion detection systems. We also discuss the validation of our model followed by a set of experiments we have carried out to evaluate the performance of our model using realistic case studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE symposium on security and privacy (2001)

    Google Scholar 

  2. Crispin, C., Steve, B., John, J., Perry, W.: Pointguard - Protecting pointers from buer over vulnerabilities. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C. (2003)

    Google Scholar 

  3. Barrantes, E.G., Ackley, D.H., Forrest, S., Palmer, T.S., et al.: Randomized instruction set emulation to disrupt binary code injection attacks. In: Proceeding of the 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  4. Jon, G., Somesh, J., Bart, M.: Efficient context-sensitive intrusion detection. In: Network and Distributed System Security Symposium (2004)

    Google Scholar 

  5. Percus, J.K., Percus, O.E., Alan, S.P.: Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self non-self discrimination. Proceedings of the National Academy of Sciences of the United States of America 90, 1691–1695 (1993)

    Article  Google Scholar 

  6. Jansen, W.: Intrusion detection with mobile agents. Computer Communications 25(15), 1392–1401 (2002)

    Article  Google Scholar 

  7. Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10) (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yeom, KW., Park, JH. (2005). An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_31

Download citation

  • DOI: https://doi.org/10.1007/11596981_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics