ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION

Artificial immune systems (AIS) are one of the most recent approaches in computational intelligence. This emerging field is sometimes referred to as immunological computation. The development of AIS is fostered by the advances made in understanding the complex mechanisms of the biological immune system. They provide efficient and robust information processing capabilities for solving complex problems. They can learn, adapt previously learned information, and perform pattern recognition/classification in a distributed way. This article discusses AIS especially in the context of misbehavior detection in wireless ad hoc (sensor) networks.

[1]  Sanjay Goel,et al.  Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches , 2003, Complex..

[2]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[3]  L B FASTIER,et al.  The failure of hyaluronidase to influence growth of PR8 virus in chick embryos. , 1951, Journal of immunology.

[4]  C Caux,et al.  Immunobiology of dendritic cells. , 2000, Annual review of immunology.

[5]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[6]  F T Vertosick,et al.  The immune system as a neural network: a multi-epitope approach. , 1991, Journal of theoretical biology.

[7]  Carlos A. Coello Coello,et al.  Multiobjective Optimization Using Ideas from the Clonal Selection Principle , 2003, GECCO.

[8]  Peter J. Bentley,et al.  Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.

[9]  Julie Greensmith,et al.  Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.

[10]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[11]  Mark Harman,et al.  Genetic and Evolutionary Computation (GECCO) , 2003 .

[12]  Uwe Aickelin,et al.  libtissue - implementing innate immunity , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[13]  Charles A. Janeway,et al.  INAUGURAL ARTICLE by a Recently Elected Academy Member:How the immune system works to protect the host from infection: A personal view , 2001 .

[14]  Jonathan Timmis,et al.  Artificial immune systems - a new computational intelligence paradigm , 2002 .

[15]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[16]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[17]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[18]  S. Forrest,et al.  Immunology as Information Processing , 2001 .

[19]  L. Segel,et al.  Design Principles for the Immune System and Other Distributed Autonomous Systems , 2001 .

[20]  F T Vertosick,et al.  Immune network theory: a role for parallel distributed processing? , 1989, Immunology.

[21]  Helena Szczerbicka,et al.  Impact of Packet Injection Models on Misbehaviour Detection Performance in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[22]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[23]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[24]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.