期刊文献+

无线Mesh网络中基于人工免疫系统的异常检测(英文) 被引量:3

Towards an Artificial Immune System for Detecting Anomalies in Wireless Mesh Networks
下载PDF
导出
摘要 This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently. This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently.
出处 《China Communications》 SCIE CSCD 2011年第3期107-117,共11页 中国通信(英文版)
基金 supported by National Natural Science Foundation of China under Grant No.60932003 National High Technical Research and Development Program of China(863 program) Grant No.2007AA01Z452,No.2009AA01Z118 Shanghai Municipal Natural Science Foundation under Grant No.09ZR1414900 National Undergraduate Innovative Test Program under Grant No.091024812
关键词 immune system intrusion detection mobile agent wireless mesh network network security immune system intrusion detection mobile agent wireless mesh network network security
  • 相关文献

参考文献22

  • 1Yi Ping,Jiang Xinghao,Wu Yue,Liu Ning.Distributed intrusion detection for mobile ad hoc networks[J].Journal of Systems Engineering and Electronics,2008,19(4):851-859. 被引量:7
  • 2Yi Ping,Zou Futai,Jiang Xinghao,Li Jianhua.Multi-agent cooperative intrusion response in mobile adhoc networks[J].Journal of Systems Engineering and Electronics,2007,18(4):785-794. 被引量:6
  • 3Yih-Chun Hu,Adrian Perrig,David B. Johnson.Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks[J]. Wireless Networks . 2005 (1-2)
  • 4Yongguang Zhang,Wenke Lee,Yi-An Huang.Intrusion Detection Techniques for Mobile Wireless Networks[J]. Wireless Networks . 2003 (5)
  • 5KIM J,BENTLEY P J.Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection. Proceedings of the Genetic and Evolutionary Computation Conference ( GECCO’’99) . 1999
  • 6BOUKERCHE A,,MACHADO R B,JUCA R L.An agent based andbiological inspired real-time intrusion detection and security model forcomputer network operations. Computer Communications . 2007
  • 7Lau,H.Y.K,V.W.K.Wong.An immunity-based distributed multiagent-control framework. Systems,Man and Cybernetics, Part A:Systems and Humans, IEEE Transactions on . 2006
  • 8Yi P,Wu Y,Zou FT,et al.A Survey on Security in Wire-less Mesh Networks. IETE Technical Review . 2010
  • 9DASGUPTA D.Immunity-based intrusion detection system: A general framework. In Proceedings of the 22nd National Information Systems Security Conference (NISSC) . 1999
  • 10Akyildiz Ian E,Wang Xudong,Wang Weilin.Wireless mesh networks: a survey. Computer Networks . 2005

二级参考文献5

共引文献10

同被引文献31

  • 1郑康锋,王秀娟,杨义先,郭世泽.利用希尔伯特黄变换检测DDoS攻击(英文)[J].China Communications,2011,8(2):126-133. 被引量:1
  • 2朱维军,王忠勇,张海宾.一种基于区间时序逻辑模型检测的入侵检测算法(英文)[J].China Communications,2011,8(3):66-72. 被引量:5
  • 3陈林,刘波,胡华平,肖枫涛,张静.“In-VM”模型的隐藏代码检测模型(英文)[J].China Communications,2011,8(4):99-108. 被引量:2
  • 4STIBOR T, TIMMIS J, ECKERT C. A Comparative Study Of Real-Valued Negative Selection To Statistical Anomaly Detection Techniques [C]// Proceedhags of the 4th Interna- tional Conference On Artificial Immune Systems. Springer, 2005: 262-275.
  • 5GREENSMITH J, AICKELIN U, CAYZER S. Introducing Dendritic Cells As a Novel Immune-Inspked Algorithm for Anomaly Detection[C]//Proceedings of ICARIS-05. LNCS 3627, 2005: 153-167.
  • 6GREENSMITH J, TWYCROSS J, AICKELIN U. Dendritic Cells for Anomaly Detection[C]//Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006), Van- couver, BC. IEEE Press, 2006: 664-671.
  • 7AL-HAMMADI Y, AICKELIN U, GREENSMITH J. DCA for Bot Detection[C]//Proceedings of the IEEE World Con- gress on Computational Intelligence (WCCI2008): July 1-6, 2008, Hong Kong. IEEE Press, 2008: 1807-1816.
  • 8GU Feng, GREENSMITH J, AICKELIN U. Integrating Re- al-Time Analysis With The Dendritic Cell Algorithm Through Segmentation[C]//Proceedings of the 11 th Annual conference on Genetic and evolutionary computation (GECCO'2009): July 8-12, 2009, Montreal, QC, Canada. ACM Press, 2009: 1203-1210.
  • 9AL-HAMMADI Y, AICKELIN U, GREENSMITH J. Per- formance Evaluation of DCA and SRC on a Single Bot De- tection[J]. Journal of Information Assurance and Security, 2010, 2010(5): 303-313.
  • 10TWYCROSS J, AICKELIN U, AMANDA M. Detecting A- nomalous Process Behaviour using Second Generation Arti-ficial Immune Systems[J]. International Journal of Uncon- ventional Computing, 2010, 6(3-4): 301-326.

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部