An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique

The deployment of wireless sensor networks and mobile ad-hoc networks in applications such as emergency services, warfare and health monitoring poses the threat of various cyber hazards, intrusions and attacks as a consequence of these networks' openness. Among the most significant research difficulties in such networks safety is intrusion detection, whose target is to distinguish between misuse and abnormal behavior so as to ensure secure, reliable network operations and services. Intrusion detection is best delivered by multi-agent system technologies and advanced computing techniques. To date, diverse soft computing and machine learning techniques in terms of computational intelligence have been utilized to create Intrusion Detection and Prevention Systems (IDPS), yet the literature does not report any state-of-the-art reviews investigating the performance and consequences of such techniques solving wireless environment intrusion recognition issues as they gain entry into cloud computing. The principal contribution of this paper is a review and categorization of existing IDPS schemes in terms of traditional artificial computational intelligence with a multi-agent support. The significance of the techniques and methodologies and their performance and limitations are additionally analyzed in this study, and the limitations are addressed as challenges to obtain a set of requirements for IDPS in establishing a collaborative-based wireless IDPS (Co-WIDPS) architectural design. It amalgamates a fuzzy reinforcement learning knowledge management by creating a far superior technological platform that is far more accurate in detecting attacks. In conclusion, we elaborate on several key future research topics with the potential to accelerate the progress and deployment of computational intelligence based Co-WIDPSs.

[1]  C. Lucas,et al.  Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..

[2]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[3]  Guofei Gu,et al.  Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.

[4]  Russell C. Eberhart,et al.  Computational intelligence - concepts to implementations , 2007 .

[5]  Xin Xu,et al.  A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.

[6]  John A. Clark,et al.  A grammatical evolution approach to intrusion detection on mobile ad hoc networks , 2009, WiSec '09.

[7]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .

[8]  Chunhui Zhao,et al.  A Detection Method for Routing Attacks of Wireless Sensor Network Based on Fuzzy C-means Clustering , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[9]  Daniel Curiac,et al.  Ensemble based sensing anomaly detection in wireless sensor networks , 2012, Expert Syst. Appl..

[10]  Xiao-Ping Zhang,et al.  Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I , 2005, ICIC.

[11]  Li Jun,et al.  HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .

[12]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[13]  Siavash Khorsandi,et al.  Coordination of cooperation policies in a peer-to-peer system using swarm-based RL , 2012, J. Netw. Comput. Appl..

[14]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[15]  Wang Jie,et al.  The method of network intrusion detection based on the neural network GCBP algorithm , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[16]  K. L. Shunmuganathan,et al.  Multi-Agent-Based Anomaly Intrusion Detection , 2011, Inf. Secur. J. A Glob. Perspect..

[17]  Sang Hyuk Son,et al.  Using fuzzy logic for robust event detection in wireless sensor networks , 2012, Ad Hoc Networks.

[18]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[19]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[20]  Maria Papadaki,et al.  Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.

[21]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[22]  Ali Moeini,et al.  NFIDS: a neuro-fuzzy intrusion detection system , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.

[23]  Rajive Bagrodia,et al.  ComSen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks , 2012, SECURWARE 2012.

[24]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[25]  J. Buckley,et al.  Fuzzy genetic algorithm and applications , 1994 .

[26]  Ahmed Patel,et al.  Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing , 2012, CSS.

[27]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[28]  Eduardo F. Morales,et al.  An Introduction to Reinforcement Learning , 2011 .

[29]  Yinhui Li,et al.  An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..

[30]  S. V. Raghavan,et al.  Intrusion detection through learning behavior model , 2001, Comput. Commun..

[31]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[32]  Mohammad S. Obaidat,et al.  FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..

[33]  Pedro Malagón,et al.  Improving security in WMNs with reputation systems and self-organizing maps , 2011, J. Netw. Comput. Appl..

[34]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[35]  Frank Doelitzscher,et al.  An agent based business aware incident detection system for cloud environments , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[36]  Benton H. Calhoun,et al.  Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.

[37]  Andreas Fuchsberger,et al.  Intrusion Detection Systems and Intrusion Prevention Systems , 2005, Inf. Secur. Tech. Rep..

[38]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.

[39]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[40]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[41]  Nick Antonopoulos,et al.  Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..

[42]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..

[43]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[44]  Álvaro Herrero,et al.  MOVIH-IDS: A mobile-visualization hybrid intrusion detection system , 2009, Neurocomputing.

[45]  Levente Buttyán,et al.  Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.

[46]  John A. Clark,et al.  Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.

[47]  Georgios Kambourakis,et al.  Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..

[48]  Nagaraju Devarakonda,et al.  Integrated Bayes Network and Hidden Markov Model for Host based IDS , 2012 .

[49]  Joseph S. Sherif,et al.  Intrusion detection: systems and models , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[50]  Lotfi A. Zadeh,et al.  Soft computing and fuzzy logic , 1994, IEEE Software.

[51]  Alexandros G. Fragkiadakis,et al.  Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype , 2012, EURASIP J. Wirel. Commun. Netw..

[52]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[53]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[54]  N.B. Idris,et al.  Artificial Intelligence Techniques Applied to Intrusion Detection , 2005, 2005 Annual IEEE India Conference - Indicon.

[55]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[56]  Gyula Simon,et al.  Sensor network-based countersniper system , 2004, SenSys '04.

[57]  Patrick van der Smagt,et al.  Introduction to neural networks , 1995, The Lancet.

[58]  Fabio A. González,et al.  CIDS: An agent-based intrusion detection system , 2005, Comput. Secur..

[59]  Cheryl Surman,et al.  Wireless sensors and sensor networks for homeland security applications. , 2012, Trends in analytical chemistry : TRAC.

[60]  Richard S. Sutton,et al.  Introduction to Reinforcement Learning , 1998 .

[61]  Robert Fullér,et al.  Introduction to neuro-fuzzy systems , 1999, Advances in soft computing.

[62]  Sanjay Jha,et al.  Wireless Sensor Networks for Battlefield Surveillance , 2006 .

[63]  Hsiao-Hwa Chen,et al.  Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.

[64]  Arturo Ribagorda,et al.  Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.

[65]  Bernhard Sick,et al.  Learning from others: Exchange of classification rules in intelligent distributed systems , 2012, Artif. Intell..

[66]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[67]  Mohammad Saniee Abadeh,et al.  A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..

[68]  Boubaker Daachi,et al.  Application of fuzzy inference systems to detection of faults in wireless sensor networks , 2012, Neurocomputing.

[69]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[70]  A. Piskozub,et al.  Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[71]  H. Javitz,et al.  Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .

[72]  Jianqing Ma,et al.  SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks , 2006, WISA.

[73]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[74]  Q. Liang,et al.  Event detection in wireless sensor networks using fuzzy logic system , 2005, CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005..

[75]  Adel Nadjaran Toosi,et al.  A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..

[76]  Qiming He,et al.  Using reinforcement learning for pro-active network fault management , 2000, WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420).

[77]  Boleslaw K. Szymanski,et al.  NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .

[78]  Juan Hernández-Serrano,et al.  Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks , 2011, Networking Workshops.

[79]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[80]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[81]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[82]  Yifeng Zeng,et al.  EXPERIMENTS WITH ONLINE REINFORCEMENT LEARNING IN REAL-TIME STRATEGY GAMES , 2009, Appl. Artif. Intell..

[83]  Igor Skrjanc,et al.  Fault detection for nonlinear systems with uncertain parameters based on the interval fuzzy model , 2007, Eng. Appl. Artif. Intell..

[84]  Malcolm I. Heywood,et al.  A Hierarchical SOM based Intrusion Detection System , 2008 .

[85]  Shu-Chin Wang,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..

[86]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[87]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[88]  Andrew J. Clark,et al.  Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..

[89]  Raquel Barco,et al.  Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..

[90]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[91]  Xin Xu,et al.  Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.

[92]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[93]  A. Halim Zaim,et al.  A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..

[94]  Majid Nili Ahmadabadi,et al.  Cooperative Q-learning: the knowledge sharing issue , 2001, Adv. Robotics.

[95]  Amparo Alonso-Betanzos,et al.  A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture , 2007, KES-AMSTA.

[96]  Nong Ye,et al.  A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .

[97]  Jens Myrup Pedersen,et al.  WITHDRAWN: An intelligent collaborative Intrusion Detection and Prevention System for Smart Grid environments , 2013 .

[98]  Huang Tianshu,et al.  A Fast Fuzzy Set Intrusion Detection Model , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.

[99]  Yu-Fang Chung,et al.  Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..