AN ARCHITECTURE FOR INTRUSION DETECTION AND ACTIVE RESPONSE USING AUTONOMOUS AGENTS IN MOBILE AD HOC NETWORKS
Ping yi, Shiyong Zhang, Yiping Zhong
2005
Abstract
This paper focuses on investigating immunological principles in designing the multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.
References
- S. Corson, J. Macker, 1999, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, RFC 2501, January 1999
- Srdjan Capkun, Levente Nuttyan, Jean-Pierre Hubaux, 2003, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, 2(2003)1, 52-64
- Lidong Zhou, Zygmunt J. Haas, 1999, Securing ad hoc networks, IEEE Networks Special Issue on Network Security, 13(1999)6, 24-30
- P.Papadimitratos, Z.Haas, 2002, Secure routing for mobile ad hoc networks, in Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January 27-31,2002
- Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2002, Ariadne: A secure on-demand routing protocol for ad hoc networks, in Proceedings of the MobiCom 2002, Atlanta, Georgia, USA, September 23-28, 2002, 12-23
- Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer, 2002, A secure routing protocol for ad hoc networks, in Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), Paris, France, November 12-15, 2002, 78-86
- Yih-Chun Hu, David B. Johnson, and Adrian Perrig, 2002, SEAD: Secure efficient distance vector routing for
- the 4th IEEE Workshop on Mobile Computing
- Systems & Applications (WMCSA 2002), Calicoon,
- NY, June 2002, 3-13
- Yongguang Zhang, Wenke Lee, 2003, Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks, 9(2003)5, 545-556
- S. Forrest, S. Hofmeyr, and A. Somayaji, 1997, Computer Immunology, Communications of the ACM, 40(1997)10, 88-96
- S.Hofmeyr , S.Forrest , 1999, Immunity by design: An artificial immune system, In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Morgan-Kaufmann, San Francisco, CA, 1999, 1289-1296
- S. Hofmeyr, S. Forrest, 2000, Architecture for an artificial immune system, Evolutionary Computation Journal 8(2000)4, 443-473
- S. Forrest, A.S. Perelson, L. Allen, R. Cherukuri, 1994, Self-nonself discrimination in a computer, In Proceedings of the 1994 IEEE Symposium on Security and Privacy, Oakland, CA, May 16 - 18, 1994, 202-214
- J.Kim, P. J.Bentley, 1999, Negative selection and niching by an artificial immune system for network intrusion detection, Genetic and Evolutionary Computation Conference (GECCO 7899), Orlando, Florida, July 13- 17,1999,149-158
- Dipankar Dasgupta, 1999, Immunity-based intrusion detection systems: A general framework, In the proceedings of the 22nd National Information Systems Security Conference (NISSC), Arlington, Virginia, USA, October 18-21, 1999,147-160
- Ping Yi, Yichuan Jiang , Yiping Zhong, Shiyong Zhang, 2005, Distributed Intrusion Detection for mobile ad hoc networks, The 2005 International Symposium on Applications and the Internet (SAINT2005), Trento, Italy, January 31 - February 4, 2005
Paper Citation
in Harvard Style
yi P., Zhang S. and Zhong Y. (2005). AN ARCHITECTURE FOR INTRUSION DETECTION AND ACTIVE RESPONSE USING AUTONOMOUS AGENTS IN MOBILE AD HOC NETWORKS . In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 972-8865-19-8, pages 220-226. DOI: 10.5220/0002512902200226
in Bibtex Style
@conference{iceis05,
author={Ping yi and Shiyong Zhang and Yiping Zhong},
title={AN ARCHITECTURE FOR INTRUSION DETECTION AND ACTIVE RESPONSE USING AUTONOMOUS AGENTS IN MOBILE AD HOC NETWORKS},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2005},
pages={220-226},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002512902200226},
isbn={972-8865-19-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - AN ARCHITECTURE FOR INTRUSION DETECTION AND ACTIVE RESPONSE USING AUTONOMOUS AGENTS IN MOBILE AD HOC NETWORKS
SN - 972-8865-19-8
AU - yi P.
AU - Zhang S.
AU - Zhong Y.
PY - 2005
SP - 220
EP - 226
DO - 10.5220/0002512902200226