Abstract
Many single points of failure exist in an intrusion detection system (IDS) based on a hierarchical architecture that does not have redundant communication lines and the capability to dynamically reconfigure relationships in the case of failure of key components. To solve this problem, we propose an IDS inspired by the human immune system based upon several mobile agents. The mobile agents act similarly to white blood cells of the immune system and travel from host to host in the network to detect any intrusions. As in the immune system, intrusions are detected by distinguishing between "self" and "non-self", or normal and abnormal process behavior respectively. In this paper we present our model, and show how mobile agent and artificial immune paradigms can be used to design efficient intrusion detection systems. We also discuss the validation of our model followed by a set of experiments we have carried out to evaluate the performance of our model using realistic case studies.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE symposium on security and privacy (2001)
Crispin, C., Steve, B., John, J., Perry, W.: Pointguard - Protecting pointers from buer over vulnerabilities. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C. (2003)
Barrantes, E.G., Ackley, D.H., Forrest, S., Palmer, T.S., et al.: Randomized instruction set emulation to disrupt binary code injection attacks. In: Proceeding of the 10th ACM Conference on Computer and Communications Security (2003)
Jon, G., Somesh, J., Bart, M.: Efficient context-sensitive intrusion detection. In: Network and Distributed System Security Symposium (2004)
Percus, J.K., Percus, O.E., Alan, S.P.: Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self non-self discrimination. Proceedings of the National Academy of Sciences of the United States of America 90, 1691–1695 (1993)
Jansen, W.: Intrusion detection with mobile agents. Computer Communications 25(15), 1392–1401 (2002)
Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10) (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yeom, KW., Park, JH. (2005). An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_31
Download citation
DOI: https://doi.org/10.1007/11596981_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)