Abstract
In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper we investigate the use of an Artificial Immune System (AIS) to detect node misbehavior in a mobile ad-hoc network using DSR. The system is inspired by the natural immune system of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns and detects new misbehavior. We describe the first step of our design; it employs negative selection, an algorithm used by the natural immune system. We define how we map the natural immune system concepts such as self, antigen and antibody to a mobile ad-hoc network, and give the resulting algorithm for misbehavior detection. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters impact the results. Further steps will extend the design by using an analogy to the innate system, danger signals, costimulation and memory cells.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sergio Marti, T.J.: Giuli,Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of MOBICOM 2000, pp. 255–265 (2000)
Buchegger, S., Le Boudec, J.-Y.: A Robust Reputation System for Mobile ad hoc Networks. Technical Report, IC/2003/50, EPFL-DI-ICA, Lausanne, Switzerland (July 2003)
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness In Distributed Ad-Hoc Networks. In: Proceedings of MobiHOC, June 2002, IEEE/ACM, Lausanne (2002)
Buchegger, S., Le Boudec, J.-Y.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France (March 2003)
Hofmeyr, S.A.: An Immunological Model of Distributed Detection and it’s Application to Computer Security. PhD thesis, Department of Computer Sciences, University of New Mexico (April 1999)
Hofmeyr, S.A., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 7(1), 45–68 (2000)
Kim, J., Bentley, P.J.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany (1999)
Kim, J., Bentley, P.J.: Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: Genetic and Evolutionary Computation Conference 2001 (GECCO 2001), San Francisko, July 7-11, pp. 1330–1337.
Kim, J., Bentley, P.J.: The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with Negative Selection Operator. In: The Congres on Evolutionary Computation (CEC 2001), Seoul, Korea, May 27-30, pp. 1244–1252 (2001)
Kim, J., Bentley, P.J.: Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. In: The Congress on Evolutionary Computation (CEC-2002), Honolulu, May 12-17, pp. 1015–1020 (2002)
Matzinger, P.: Tolerance, Danger and the Extended Family. Annual Review of Immunology 12, 991–1045 (1994)
Matzinger, P.: The Danger Model in it’s Historical Contex. Scandinavian Journal of Immunology 54, 4–9 (2001)
Sompayrac, L.M.: How the Immune SystemWorks, 2nd edn. Blackwell Publishing, Malden (2003)
Mak, T.W.: Order from disorder sprung: recognition and regulation in the immune system. Phil. Trans. R. Soc. Lond. A 361, 1235–1250 (2003)
Zeng, X., Bagrodia, R., Gerla, M.: Glomosim:Alibrary for parallel simulation of large scale wireless networks. In: Proceedings of the 12th workshop on Parallel and Distributed Simulations-PDAS 1998, in Banff, Alberta, Canada, May 26-29 (1998)
Johnson, D.B., Maltz, D.A.: The dynamic source routing protocol for mobile ad hoc networks. Internet draft, Mobile Ad Hoc Network (MANET) Working Group, IETF (February 2003)
Iannaccone, G., Chuah, C.-N., Mortier, R., Bhattacharyya, S., Diot, C.: Analysis of Link Failures in an IP Backbone. In: Proceeding of IMW 2002, November 2002, ACM Press, Marseille (2002)
De Castro, L.N., Von Zuben, F.J.: Artificial Immune Systems: Part I Basic Theory and Application, Technical Report RT DCA 01/99 (1999)
de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Berlin (2002)
Dasgupta, D., González, F.: An Immunity-Based Technique to Characterize Intrusions in Computer Networks. IEEE Trans. Evol. Comput. 9(6), 1081–1088 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Le Boudec, JY., Sarafijanović, S. (2004). An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks. In: Ijspeert, A.J., Murata, M., Wakamiya, N. (eds) Biologically Inspired Approaches to Advanced Information Technology. BioADIT 2004. Lecture Notes in Computer Science, vol 3141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27835-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-27835-1_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23339-8
Online ISBN: 978-3-540-27835-1
eBook Packages: Springer Book Archive