Reference Hub4
Modeling an Intrusion Detection System Based on Adaptive Immunology

Modeling an Intrusion Detection System Based on Adaptive Immunology

Vishwa Alaparthy, Salvatore D. Morgera
Copyright: © 2019 |Volume: 11 |Issue: 2 |Pages: 14
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781522565499|DOI: 10.4018/IJITN.2019040104
Cite Article Cite Article

MLA

Alaparthy, Vishwa, and Salvatore D. Morgera. "Modeling an Intrusion Detection System Based on Adaptive Immunology." IJITN vol.11, no.2 2019: pp.42-55. http://doi.org/10.4018/IJITN.2019040104

APA

Alaparthy, V. & Morgera, S. D. (2019). Modeling an Intrusion Detection System Based on Adaptive Immunology. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 11(2), 42-55. http://doi.org/10.4018/IJITN.2019040104

Chicago

Alaparthy, Vishwa, and Salvatore D. Morgera. "Modeling an Intrusion Detection System Based on Adaptive Immunology," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11, no.2: 42-55. http://doi.org/10.4018/IJITN.2019040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Network security has always has been an area of priority and extensive research. Recent years have seen a considerable growth in experimenting with biologically inspired techniques. This is a consequence of the authors increased understanding of living systems and the application of that understanding to machines and software. The mounting complexity of telecommunications networks and the need for increasing levels of security have been the driving factors. The human body can act as a great role model for its unique abilities in protecting itself from external entities owing to its diverse complexities. Many abnormalities in the human body are similar to that of the attacks in wireless sensor networks (WSN). This article presents the basic ideas that can help modelling a system to counter the attacks on a WSN by monitoring parameters such as energy, frequency of data transfer, data sent and received. This is implemented by exploiting an immune concept called danger theory, which aggregates the anomalies based on the weights of the anomalous parameters. The objective is to design a cooperative intrusion detection system (IDS) based on danger theory.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.