Modeling an Intrusion Detection System Based on Adaptive Immunology

Modeling an Intrusion Detection System Based on Adaptive Immunology

Vishwa Alaparthy, Salvatore D. Morgera
DOI: 10.4018/IJITN.2019040104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Network security has always has been an area of priority and extensive research. Recent years have seen a considerable growth in experimenting with biologically inspired techniques. This is a consequence of the authors increased understanding of living systems and the application of that understanding to machines and software. The mounting complexity of telecommunications networks and the need for increasing levels of security have been the driving factors. The human body can act as a great role model for its unique abilities in protecting itself from external entities owing to its diverse complexities. Many abnormalities in the human body are similar to that of the attacks in wireless sensor networks (WSN). This article presents the basic ideas that can help modelling a system to counter the attacks on a WSN by monitoring parameters such as energy, frequency of data transfer, data sent and received. This is implemented by exploiting an immune concept called danger theory, which aggregates the anomalies based on the weights of the anomalous parameters. The objective is to design a cooperative intrusion detection system (IDS) based on danger theory.
Article Preview
Top

2. Intrusion Detection Systems

Intrusion Detection systems are classified into two types based on their detection methodology (Butun, Morgera & Sankar, 2013). Anomaly based Intrusion detection systems are generally based on the prior knowledge of the system patterns. The normal behavior of the system is noted and they are compared at continuous time intervals. A deviation is noted as an anomaly and an intrusion response is initiated. Signature based or misuse based intrusion detection systems are based on the prior knowledge of the attacks as opposed to the knowledge of the system. Although, Anomaly based IDS create more overhead, they can be able to trace new attacks, unlike misuse based IDS which can be able to identify only the attacks with known profiles. Anomaly based methods can be further classified by their profile creation methods. These profiles could be statistical based, machine learning based or knowledge based. A hybrid model could prove very advantageous, however owing to the energy, memory and size constraints it is generally not preferred to build a hybrid system. See Figure 1 below.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 1 Issue (2022)
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing