Skip to main content

An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks

  • Conference paper
Biologically Inspired Approaches to Advanced Information Technology (BioADIT 2004)

Abstract

In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper we investigate the use of an Artificial Immune System (AIS) to detect node misbehavior in a mobile ad-hoc network using DSR. The system is inspired by the natural immune system of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns and detects new misbehavior. We describe the first step of our design; it employs negative selection, an algorithm used by the natural immune system. We define how we map the natural immune system concepts such as self, antigen and antibody to a mobile ad-hoc network, and give the resulting algorithm for misbehavior detection. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters impact the results. Further steps will extend the design by using an analogy to the innate system, danger signals, costimulation and memory cells.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sergio Marti, T.J.: Giuli,Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of MOBICOM 2000, pp. 255–265 (2000)

    Google Scholar 

  2. Buchegger, S., Le Boudec, J.-Y.: A Robust Reputation System for Mobile ad hoc Networks. Technical Report, IC/2003/50, EPFL-DI-ICA, Lausanne, Switzerland (July 2003)

    Google Scholar 

  3. Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness In Distributed Ad-Hoc Networks. In: Proceedings of MobiHOC, June 2002, IEEE/ACM, Lausanne (2002)

    Google Scholar 

  4. Buchegger, S., Le Boudec, J.-Y.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France (March 2003)

    Google Scholar 

  5. Hofmeyr, S.A.: An Immunological Model of Distributed Detection and it’s Application to Computer Security. PhD thesis, Department of Computer Sciences, University of New Mexico (April 1999)

    Google Scholar 

  6. Hofmeyr, S.A., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 7(1), 45–68 (2000)

    Google Scholar 

  7. Kim, J., Bentley, P.J.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany (1999)

    Google Scholar 

  8. Kim, J., Bentley, P.J.: Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: Genetic and Evolutionary Computation Conference 2001 (GECCO 2001), San Francisko, July 7-11, pp. 1330–1337.

    Google Scholar 

  9. Kim, J., Bentley, P.J.: The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with Negative Selection Operator. In: The Congres on Evolutionary Computation (CEC 2001), Seoul, Korea, May 27-30, pp. 1244–1252 (2001)

    Google Scholar 

  10. Kim, J., Bentley, P.J.: Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. In: The Congress on Evolutionary Computation (CEC-2002), Honolulu, May 12-17, pp. 1015–1020 (2002)

    Google Scholar 

  11. Matzinger, P.: Tolerance, Danger and the Extended Family. Annual Review of Immunology 12, 991–1045 (1994)

    Article  Google Scholar 

  12. Matzinger, P.: The Danger Model in it’s Historical Contex. Scandinavian Journal of Immunology 54, 4–9 (2001)

    Article  Google Scholar 

  13. Sompayrac, L.M.: How the Immune SystemWorks, 2nd edn. Blackwell Publishing, Malden (2003)

    Google Scholar 

  14. Mak, T.W.: Order from disorder sprung: recognition and regulation in the immune system. Phil. Trans. R. Soc. Lond. A 361, 1235–1250 (2003)

    Article  Google Scholar 

  15. Zeng, X., Bagrodia, R., Gerla, M.: Glomosim:Alibrary for parallel simulation of large scale wireless networks. In: Proceedings of the 12th workshop on Parallel and Distributed Simulations-PDAS 1998, in Banff, Alberta, Canada, May 26-29 (1998)

    Google Scholar 

  16. Johnson, D.B., Maltz, D.A.: The dynamic source routing protocol for mobile ad hoc networks. Internet draft, Mobile Ad Hoc Network (MANET) Working Group, IETF (February 2003)

    Google Scholar 

  17. Iannaccone, G., Chuah, C.-N., Mortier, R., Bhattacharyya, S., Diot, C.: Analysis of Link Failures in an IP Backbone. In: Proceeding of IMW 2002, November 2002, ACM Press, Marseille (2002)

    Google Scholar 

  18. De Castro, L.N., Von Zuben, F.J.: Artificial Immune Systems: Part I Basic Theory and Application, Technical Report RT DCA 01/99 (1999)

    Google Scholar 

  19. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Berlin (2002)

    MATH  Google Scholar 

  20. Dasgupta, D., González, F.: An Immunity-Based Technique to Characterize Intrusions in Computer Networks. IEEE Trans. Evol. Comput. 9(6), 1081–1088 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Le Boudec, JY., Sarafijanović, S. (2004). An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks. In: Ijspeert, A.J., Murata, M., Wakamiya, N. (eds) Biologically Inspired Approaches to Advanced Information Technology. BioADIT 2004. Lecture Notes in Computer Science, vol 3141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27835-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27835-1_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23339-8

  • Online ISBN: 978-3-540-27835-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics