Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks

Abstract Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to identify such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a bio-inspired method is introduced, namely the cooperative-based fuzzy artificial immune system (Co-FAIS). It is a modular-based defense strategy derived from the danger theory of the human immune system. The agents synchronize and work with one another to calculate the abnormality of sensor behavior in terms of context antigen value (CAV) or attackers and update the fuzzy activation threshold for security response. In such a multi-node circumstance, the sniffer module adapts to the sink node to audit data by analyzing the packet components and sending the log file to the next layer. The fuzzy misuse detector module (FMDM) integrates with a danger detector module to identify the sources of danger signals. The infected sources are transmitted to the fuzzy Q-learning vaccination modules (FQVM) in order for particular, required action to enhance system abilities. The Cooperative Decision Making Modules (Co-DMM) incorporates danger detector module with the fuzzy Q-learning vaccination module to produce optimum defense strategies. To evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using a network simulator. The model was subsequently compared against other existing soft computing methods, such as fuzzy logic controller (FLC), artificial immune system (AIS), and fuzzy Q-learning (FQL), in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed method improves detection accuracy and successful defense rate performance against attacks compared to conventional empirical methods.

[1]  Nauman Aslam,et al.  A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks , 2011, Inf. Fusion.

[2]  Ahmed Patel,et al.  BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[3]  Yang Yang,et al.  A flow-based network monitoring framework for wireless mesh networks , 2007, IEEE Wireless Communications.

[4]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[5]  Chung-Ming Ou,et al.  Agent-Based Artificial Immune Systems (ABAIS) for Intrusion Detections: Inspiration from Danger Theory , 2013 .

[6]  Julie Greensmith,et al.  Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.

[7]  Heejo Lee,et al.  APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks , 2013, Comput. Secur..

[8]  Vikas Agrawal,et al.  An agent-based simulation system for concert venue crowd evacuation modeling in the presence of a fire disaster , 2014, Expert Syst. Appl..

[9]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[10]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[11]  Julie Greensmith,et al.  The Dendritic Cell Algorithm for Intrusion Detection , 2013, Biologically Inspired Networking and Sensing.

[12]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..

[13]  Mukesh Singhal,et al.  An efficient routing algorithm to preserve k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-coverage , 2013, The Journal of Supercomputing.

[14]  Kang G. Shin,et al.  Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.

[15]  Jelena Mirkovic,et al.  D-WARD: a source-end defense against flooding denial-of-service attacks , 2005, IEEE Transactions on Dependable and Secure Computing.

[16]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[17]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[18]  Nirwan Ansari,et al.  Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..

[19]  Ashraf Darwish,et al.  Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.

[20]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[21]  Subir Halder,et al.  Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches , 2013, Wireless Networks and Security.

[22]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[23]  Feng Xia,et al.  Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..

[24]  Yu-Fang Chung,et al.  Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..

[25]  K. Shortman,et al.  Another heritage for plasmacytoid dendritic cells. , 2013, Immunity.

[26]  Sadan Kulturel-Konak,et al.  A review of clonal selection algorithm and its applications , 2011, Artificial Intelligence Review.

[27]  Zubair A. Baig,et al.  GMDH-based networks for intelligent intrusion detection , 2013, Eng. Appl. Artif. Intell..

[28]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[29]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[30]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.

[31]  Luci Pirmez,et al.  Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.

[32]  Maria Papadaki,et al.  Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.

[33]  Ilker Bekmezci,et al.  Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring , 2008, 2008 IEEE Sensors Applications Symposium.

[34]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[35]  Chung-Ming Ou,et al.  Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.

[36]  Abdul Hanan Abdullah,et al.  Overview of Data Routing Approaches for Wireless Sensor Networks , 2012, Sensors.

[37]  John A. Clark,et al.  The placement-configuration problem for intrusion detection nodes in wireless sensor networks , 2013, Comput. Electr. Eng..

[38]  Henry Y. K. Lau,et al.  Artificial Immunity Based Cooperative Sustainment Framework for Multi-Agent Systems , 2010, SGAI Conf..

[39]  Tarek S. Sobh,et al.  A cooperative immunological approach for detecting network anomaly , 2011, Appl. Soft Comput..

[40]  Hirotada Ohashi,et al.  A negative selection algorithm for classification and reduction of the noise effect , 2009, Appl. Soft Comput..

[41]  Amod Kumar,et al.  Improved thresholding based on negative selection algorithm (NSA) , 2014, Evol. Intell..

[42]  Azzedine Boukerche,et al.  An agent based and biological inspired real-time intrusion detection and security model for computer network operations , 2007, Comput. Commun..

[43]  Shahaboddin Shamshirb,et al.  Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern , 2010 .

[44]  Chung-Horng Lung,et al.  Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy-Efficient and Flexible Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[45]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[46]  Enzo Baccarelli,et al.  Energy-saving self-configuring networked data centers , 2013, Comput. Networks.

[47]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[48]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[49]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[50]  Xuxun Liu,et al.  A Survey on Clustering Routing Protocols in Wireless Sensor Networks , 2012, Sensors.

[51]  Tao Li,et al.  Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..

[52]  Raquel Barco,et al.  Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..

[53]  Yaowei Zhou,et al.  Key-insulated encryption based group key management for wireless sensor network , 2013 .

[54]  Yanheng Liu,et al.  Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks , 2013, Comput. Electr. Eng..

[55]  Ge Yu,et al.  Pulse quarantine strategy of internet worm propagation: Modeling and analysis , 2012, Comput. Electr. Eng..

[56]  S. Selvakumar,et al.  Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..

[57]  Lakhmi C. Jain,et al.  Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..

[58]  Pradeep Ray,et al.  Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results , 2012, Inf. Syst. J..

[59]  Shukor Abd Razak,et al.  Towards providing a new lightweight authentication and encryption scheme for MANET , 2011, Wirel. Networks.

[60]  Salman Ahmad Khan,et al.  Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.

[61]  Walmir M. Caminhas,et al.  Design of an artificial immune system based on Danger Model for fault detection , 2010, Expert Syst. Appl..

[62]  Kai Hwang,et al.  Collaborative detection and filtering of shrew DDoS attacks using spectral analysis , 2006, J. Parallel Distributed Comput..

[63]  Levente Buttyán,et al.  Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.