期刊文献+

AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS 被引量:2

AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS
在线阅读 下载PDF
导出
摘要 This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently. This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.
出处 《Journal of Electronics(China)》 2006年第3期417-422,共6页 电子科学学刊(英文版)
基金 Supported by the National High Technology Develop ment 863 Program of China (No.2003AA148010)Key Technologies R&D Program of China (No.2002DA103A03-07).
关键词 Immune system Intrusion detection Mobile agent Mobile ad hoc network Network security 免疫系统 入侵检测 移动代理 移动通信网络 网络安全
  • 相关文献

参考文献1

  • 1Yongguang Zhang,Wenke Lee,Yi-An Huang.Intrusion Detection Techniques for Mobile Wireless Networks[J].Wireless Networks.2003(5)

同被引文献20

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Li Yi,Wei June.Guidelines on selecting intrusion detection methods in MANET[C]//Proc of ISECON,2004,21:1022-1039.
  • 3http://www.ietf.org/rfc.htm.
  • 4Sun B,Wu K,Pooch U.Routing anomaly detection in mobile ad hoc networks[C]//Proceedings of the 12th International Conference on Computer Communications and Networks,2003:20-23.
  • 5Kachirski,Oleg,Ratan Guha.Effective intrusion detection using multiple sensors in wireless Ad hec networks[C]//Proccedings of the 36th Hawaii International Conference on System Sciences,2002.
  • 6Zhang Yongguan,Lee Wenke.lntrusion detection techniques for mobile MANET[J].Wireless Networks Journal,2003,9(5):545-556.
  • 7Huang Yi-an,Wenke lee.A coopèrative intrusion detection system for ad hac networks[C]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks,2003.
  • 8Tseng Chin-Yang.A specification-based intrusion detection system for AODV[C]//Proc of the ACM Workshop on Security of Ad Hoc and Sensor Networks,2003.
  • 9Deng Hongmei,Zeng Qing-An,Agrawal D P.SVM-based intrusion detection system for wireless Ad ho cnetworks[C]//Proceedings of the 58th IEEE Vehicular Technology Conference,2003.
  • 10Deng Hongmei,Xu Roger,Lee Wenke,et al.Agent-based cooperative anomaly detection for wireless Ad hoc networks[C]//Proceedings of the 12th International Conference on Parallel and Distributed Systems,2006:613-620.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部