Open Access Open Access  Restricted Access Subscription or Fee Access

Hybrid and Distributed Intrusion Detection System using Artificial Immune System and Swarm Intelligence for Mobile Networks

G. Sarathkumar, R. Sambathkumar, K. Sumathi

Abstract


The wireless mobile network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. The traditional way of protecting mobile networks with firewalls and encryption software is no longer sufficient and effective. New distributed intrusion detection schemes must be designed for wireless mesh mobile networks. In the first phase of the work a static simulation was completed for analyzing load balancing approaches in mobile network. In the second phase of the work we try to devise a method where we put a distributed IDS agent in each node of the wireless mobile network so that each node studies the packet flow in the corresponding mobile network and distributes it to the near by nodes in the mobile network. With this, the nodes will know the details of the packet flow in the entire mobile network using the swarm intelligence technique; thereby it tries to identify the intrusion that happens by various rule mining techniques. Here we implement hierarchical, extensible and flexible detection architecture to thwart such threats. Thus this system will help us detecting and tracking the intrusion at the early level itself with the use of hierarchical model. This will help us to reduce the false positives as well as false negatives, which will give more accuracy in detection and also increasing the quality of service in the mobile network. The overall load balancing characteristic of the network is hence improved.

Keywords


Pheromone, Intrusion, Anomaly Detection, Immune System.

Full Text:

PDF

References


S.Madhavi, “An Intrusion Detection System for Mobile Networks”. IEEE Xplore International Conference on Security and Applications (ISA), Korea, April 2008.

Yasir Abdelgadir Mohamed, Azween B. Abdullah, “Immune Inspired Approach for Securing Mobile Networks”. International Journal of Computer Science and Network Security, vol.9 no.7, July 2009

M. Zubair Shafiq and Muddassar Farooq.“Defence Against 802.11 DOS Attacks Using Artificial Immune System”.

Dipankar Dasgupta and Fabio Gonzalez, “Artificial Immune Systems in Intrusion Detection”, chapter 7. “Enhancing Computer Security with Smart Technology” by v. Rao vemuri

Zhou Lianying and Liu Fengyu,” A Swarm-Intelligence-Based Intrusion Detection Technique”. International Journal of Computer Science and Network Security, vol.6 no.7b, July 2006.

E. Bonabeau, M. Dorigo, and G. Theraulaz. “Swarm Intelligence: From Natural to Artificial Intelligence”. Oxford university, press, 1999. ISBN 0-19-513158-4.

Mesut g¨unes¸, udo sorges, imed bouazizi. “ARA – The Ant-Colony Based Routing Algorithm for MANETS”. International Conference on Parallel Processing Workshops (ICPPW 2002).

HuiKeng Lau, Jon Timmis and Iain Bate, “Anomaly Detection Inspired by Immune Network Theory: A Proposal”. IEEE Congress on Evolutionary Computation (CEC 2009).

Steven A. Hofmeyr and Stephanie Forrest in their paper “Immunity by Design: An Artificial Immune System”. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Morgan-Kaufmann, San Francisco, CA, pp. 1289-1296 (1999)

Nikos Kominos, Dimitris Vergados and Chistos Dougligeris, “Detecting Unathorized and Compromized nodes in mobile networks”, Elsevier, 2007,pp 289-298.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.