A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents

作者: Mahdi Zamani , Mahnush Movahedi , Mohammad Ebadzadeh , Hossein Pedram

DOI: 10.1109/CIS.2009.215

关键词: Immune systemDenial-of-service attackComputer securityArtificial immune systemIntrusion detection systemComputer networkWireless sensor networkComputer scienceInformation system

摘要: Most of the security problems in large and distributed information systems are vastly complex. Few research on detection burgeoning Distributed Denial Service (DDoS) attacks, leads us to expand our perspectives a comprehensive architectural approach which particular issues like arrangement communication system components appear. In this paper, many useful ideas from behaviour biological immune elicited based results latest immunological researches, especially Danger Theory. They applied create model for immunization intrusion (IDSs) that resistant DDoS. Although general various IDSs is proposed implemented research, simulation scenario detecting DDoS wireless sensor network (WSN) planned as an example assess ability undesirable events.

参考文章(16)
D. Dasgupta, Z. Ji, F. Gonzalez, Artificial immune system (AIS) research in the last five years congress on evolutionary computation. ,vol. 1, pp. 123- 130 ,(2003) , 10.1109/CEC.2003.1299565
Animesh Patcha, Jung-Min Park, None, An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer Networks. ,vol. 51, pp. 3448- 3470 ,(2007) , 10.1016/J.COMNET.2007.02.001
P. Matzinger, Essay 1: the Danger model in its historical context. Scandinavian Journal of Immunology. ,vol. 54, pp. 4- 9 ,(2001) , 10.1046/J.1365-3083.2001.00974.X
Steven A. Hofmeyr, Stephanie Forrest, Architecture for an Artificial Immune System Evolutionary Computation. ,vol. 8, pp. 443- 473 ,(2000) , 10.1162/106365600568257
Steven Andrew Hofmeyr, Stephanie Forrest, An immunological model of distributed detection and its application to computer security The University of New Mexico. ,(1999)
D. Dasgupta, N. Attoh-Okine, Immunity-based systems: a survey systems man and cybernetics. ,vol. 1, pp. 369- 374 ,(1997) , 10.1109/ICSMC.1997.625778
Silva Adriana, None, Distributed denial of service attacks systems man and cybernetics. ,vol. 3, pp. 2275- 2280 ,(2000) , 10.1109/ICSMC.2000.886455
Julie Greensmith, Uwe Aickelin, Steve Cayzer, Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection international conference on artificial immune systems. ,vol. 3627, pp. 153- 167 ,(2005) , 10.1007/11536444_12
P.K. Harmer, P.D. Williams, G.H. Gunsch, G.B. Lamont, An artificial immune system architecture for computer security applications IEEE Transactions on Evolutionary Computation. ,vol. 6, pp. 252- 280 ,(2002) , 10.1109/TEVC.2002.1011540