A Danger Model Based Anomaly Detection Method for Wireless Sensor Networks

Wireless sensor network (WSN) is the hot research subject in the field of network technologies currently, and its security problem also attracts more attentions. Especially, intrusion detection in wireless sensor networks remains an open problem. In this paper, we study a novel danger model based anomaly detection algorithm for wireless sensor networks. The danger model is built on a sensitive tissue(ST). The sensitive tissue consists of a population of sensitive cells(SCs) that are abstracted characteristics from a node of wireless sensor networks which are sensitive to attacks. ST plays a role as an interface between problems and immune cells for danger recognition and estimation. The results of the application of this novel model to the detection of the syscalls data show that the model is valid.

[1]  C. Janeway Immunobiology: The Immune System in Health and Disease , 1996 .

[2]  Donggang Liu,et al.  Security for Wireless Sensor Networks (Advances in Information Security) , 2006 .

[3]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[4]  Goto Shigeki,et al.  An Improved Intrusion Detecting Method Based on Process Profiling , 2002 .

[5]  Jamie Paul Twycross,et al.  Integrated innate and adaptive artificial immune systems applied to process anomaly detection , 2007 .

[6]  P. Matzinger,et al.  An innate sense of danger. , 1998, Seminars in immunology.

[7]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[8]  Uwe Aickelin,et al.  Information fusion in the immune system , 2010, Inf. Fusion.

[9]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[10]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[11]  Fabio Roli,et al.  Information fusion in computer security , 2009, Inf. Fusion.

[12]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[13]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[14]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[15]  David Y. Fong,et al.  Wireless Sensor Networks , 2003 .