Implementation of IDS with response for securing MANETs

This paper presents a new approach to secure Mobile ad hoc networks (MAN Ts) based on the paradigm of Artificial Immune System (HIS). An intrusion detection system with response (IDS) that simulates a considerable number of immune system features. A considerable amount of immune properties have been mapped to ad hoc networks seeking for comprehensive security system. Negative selection, clonal selection, danger theory, immune network concept are the main paradigms that have been considered in our system. Anomaly detection, first and second response, learning capability, decentralized and reliable detection system are the features that e pected to contribute more to ad hoc network security.

[1]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[2]  Christophe Bidan,et al.  Security of predefined groups in manets , 2007, Q2SWinet '07.

[3]  Ki-Won Yeom,et al.  An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.

[4]  Michael Hilker,et al.  Next Challenges in Bringing Artificial Immune Systems to Production in Network Security , 2008, ArXiv.

[5]  Fikret Sivrikaya,et al.  Energy-efficient channel access and routing protocols for multi-hop wireless networks , 2007 .

[6]  Tao Li,et al.  Immune Multi-agent Active Defense Model for Network Intrusion , 2006, SEAL.

[7]  Tansu Alpcan,et al.  A Cooperative AIS Framework for Intrusion Detection , 2007, 2007 IEEE International Conference on Communications.

[8]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[9]  Marco Carvalho,et al.  Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.

[10]  Muddassar Farooq,et al.  A sense of danger: dendritic cells inspired artificial immune system for manet security , 2008, GECCO '08.

[11]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[12]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[13]  Chen Zhongmin,et al.  The Algorithm Design of Agent for Detecting and Analyzing Data in Intrusion Detection Based on Immune Principle , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Azzedine Boukerche,et al.  A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[15]  Tao Li,et al.  Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..

[16]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[17]  Takeshi Okamoto,et al.  Framework of an Immunity-Based Anomaly Detection System for User Behavior , 2007, KES.

[18]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[19]  Wenjian Luo,et al.  Designing Abstract Immune Mobile Agents for Distributed Intrusion Detection , 2005, 2005 International Conference on Neural Networks and Brain.

[20]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[21]  MisraSudip,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008 .

[22]  Davood Maleki,et al.  An Intrusion Detection Technique using Co-Co Immune System for Distributed Data Networks (CoCo -ISD) , 2008 .

[23]  Sudip Misra,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..