CFP last date
20 May 2024
Reseach Article

A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks

by Anass Khannous, Anass Rghioui, Fatiha Elouaai, Mohammed Bouhorma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 15
Year of Publication: 2014
Authors: Anass Khannous, Anass Rghioui, Fatiha Elouaai, Mohammed Bouhorma
10.5120/16088-5401

Anass Khannous, Anass Rghioui, Fatiha Elouaai, Mohammed Bouhorma . A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks. International Journal of Computer Applications. 92, 15 ( April 2014), 50-53. DOI=10.5120/16088-5401

@article{ 10.5120/16088-5401,
author = { Anass Khannous, Anass Rghioui, Fatiha Elouaai, Mohammed Bouhorma },
title = { A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 15 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 50-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number15/16088-5401/ },
doi = { 10.5120/16088-5401 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:25.823671+05:30
%A Anass Khannous
%A Anass Rghioui
%A Fatiha Elouaai
%A Mohammed Bouhorma
%T A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 15
%P 50-53
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The use of artificial immune systems (AIS) in intrusion detection is an attractive concept for several reasons. Then it is judicious to expect that approaches of biological inspirations in this area, and specifically the abstraction of immune defense mechanism with its high detection capabilities and its strong defense against intrusion, will probably be able to meet this challenge. Researchers have implemented different immune models to design intrusion detection systems (IDS) in order to secure Mobile Ad Hoc Networks (MANET), but the most popular one is the self and non-self model. This model was used in the vast majority of biological inspiration in the field of MANET security. It has demonstrated attractive success, as well as it showed some weakness especially in terms of scalability and coverage. This paper try to incorporate some additional concepts proposed by the new danger theory in order to overcome some of the problems related to the adoption of the self and non-self-model. The proposed algorithm integrates and combines the basic concepts of intrusion detection system based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.

References
  1. J W Kim. "Integrating Artificial Immune Algorithms for Intrusion Detection", PhD thesis, University College London, 2002.
  2. De Castro . L. N & Von Zuben . F. J "Artificial Immune Systems: Part I - Basic theory and applications", Technical report, TR-DCA-01/99, December 99.
  3. De Castro . L. N & Von Zuben . F. J "Artificial Immune Systems: Part II - A survey of application", Technical report- DCA RT 02 /00, 2000. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Matzinger. P. "Tolerance, danger and the extended family", Annual reviews in Immunology, 12: 991- 1045, 1994.
  5. Matzinger . P. "An innate sense of danger". Seminars in Immunology, 10:399-415, 1998.
  6. Matzinger. P "The Danger Model: A renewed Sense of Self", Science 296: 301-305, 2002.
  7. M. Burgess. "Computer immunology". In Proc. of the Systems Administration Conference (LISA-98), pages 283-297, 1998.
  8. M. Burgess. "Evaluating cfegine's immunity model of site maintenance". In Proceeding of the 2nd SANE System Administration Conference (USENIX/NLUUG), 2000.
  9. M. Burgess. Recent developments in cfengine. In Proceedings of the 2nd Unix. nl conference, Netherlands, 2001.
  10. M. Burgess. "Two dimensional time-series for anomaly detection and regulation in adaptive systems". In M. Feridum et al. , editor, Proceedings of 13th IFIP/IEEE International Workshop on Distributed System, Operations and Management (DSOM 2002), volume 2506 of Lecture Notes in Computer Science, pages 169-180. Springer-Verlag, 2002.
  11. Aickelin. U & Bentley . P & Cayzer. S & Kim . J & McLeod. J "Danger Theory: The Link between AIS and IDS?", in Proceedings ICARIS – 2003, 2nd International Conference on Artificial Immune Systems, 147 – 155, 2003.
  12. U. Aickelin and S. Cayzer. "The danger theory and its application to AIS". In J. Timmis and P. J. Bentley, editors, in Proceeding (ICARIS), pages 141-148, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

MANET AIS IDS Danger theory Negative selection