A Sense of Danger: Dendritic Cells Inspired Artificial Immune System (AIS) for MANET Security
نویسندگان
چکیده
AIS-based anomaly detection systems classically utilize the paradigm of self/non-self discrimination. In this approach, an algorithm learns self during a learning phase, therefore, such algorithms do not have the ability to cope with scenarios in which self is continuously changing with time. This situation is encountered once malicious nodes are to be detected in a Mobile Ad Hoc Network (MANET). Consequently, it becomes a challenge to differentiate a valid route change due to mobility from an illegal one due to tampering of routing information by malicious nodes. In this paper, we propose a dendritic cell based distributed misbehavior detection system, BeeAIS-DC, for a Bio/Nature inspired MANET routing protocol, BeeAdHoc. Our proposed system inspires from the danger theory and models the function and behavior of dendritic cells to detect the presence or absence of danger and provides a tolerogenic or immunogenic response. The proposed detection system is implemented in a well-known ns-2 simulator. Our results indicate that our detection system not only enables BeeAIS-DC to dynamically adapt its detector set to cater for a changing self due to mobility of nodes, but also is robust enough to provide significantly smaller false positives as compared to self/non-self based AIS. Moreover, the danger theory related overhead of BeeAIS-DC is minimal, and as a result, it does not degrade traditional performance metrics of BeeAdHoc. This behavior is vital for battery/bandwidth constrained mobile nodes.
منابع مشابه
Energy Efficient Security in MANETs: A Comparison of Cryptographic and Artificial Immune Systems
MANET is characterised by a set of mobile nodes in an inherently insecure environment, having limited battery capacities. Provisioning of energy efficient security in MANETs is, therefore, an open problem for which a number of solutions have been proposed. In this paper, we present an overview and comparison of the MANET security at routing layer by using the cryptographic and Artificial Immune...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملDanger! Computer Security meets Operational Research
Artificial Immune Systems (AIS) are a collection of algorithms inspired by aspects of the human immune system. The arguably most obvious application of AIS was to detect intrusions in computer networks. If we can fight viruses with our immune systems, then surely we can fight computer viruses with a computer immune system? Early AIS approaches used a technique called Negative Selection, which d...
متن کاملSemantic Preserving Data Reduction using Artificial Immune Systems
Artificial Immune Systems (AIS) can be defined as soft computing systems inspired by immune system of vertebrates. Immune system is an adaptive pattern recognition system. AIS have been used in pattern recognition, machine learning, optimization and clustering. Feature reduction refers to the problem of selecting those input features that are most predictive of a given outcome; a problem encoun...
متن کاملDetecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm
The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, c...
متن کامل