An Artificial Immune System for Misbehavior Detection in Mobile Ad Hoc Networks with both Innate, Adaptive Subsystems and with Danger Signal
نویسنده
چکیده
The successful operation of a mobile ad hoc network depends on cooperation of the nodes in providing services to each other. Nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR) [13]. The network is vulnerable due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability [1], [2], [3], [4], [6], [7]. Our approach for misbehavior detection in DSR is to use an Artificial Immune System (AIS) [14], [15]. The system is inspired by the natural immune system of vertebrates [10]. The main task of the natural immune system (the IS) is to protect the human body against microorganism invaders and some malfunctioning own cells, while being tolerant to normal own cells, self cells. To accomplish this task, the IS has developed some detection and reaction mechanisms and procedures, which may be useful for solving analogous problems in building an AIS. The work presented here is a continuation of our previous work [6], [7]. In the previous work we proposed a solution for mapping some basic parts of the IS to our AIS: representation, matching, and negative and clonal selection. We implemented and validated the solution in the Glomosim simulator [11]. The system had a separate preliminary phase for collecting selfbehavior examples. This phase had to be run in a protected environment, when there is no misbehavior of the nodes. It is very hard to provide such conditions in a real network. In this work we give three main improvements for our AIS. First, we propose a solution that doesn’t require a preliminary learning phase in the protected environment (the environment without misbehavior). The solution uses analogy with the IS danger signal [8], [9]. Second, we add the innate part of the AIS, which provides fast detection of misbehavior
منابع مشابه
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper we investigate the use of an Artificial Immune System (AIS) to detect ...
متن کاملAn Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors
Nodes that build a mobile ad-hoc network participate in a common routing protocol in order to provide multi-hop radio communication. Routing defines how control information is exchanged between nodes in order to find the paths between communication pairs, and how data packets are relayed. Such networks are vulnerable to routing misbehavior, due to faulty, selfish or malicious nodes. Misbehavior...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کامل