SAID: a self-adaptive intrusion detection system in wireless sensor networks

作者: Jianqing Ma , Shiyong Zhang , Yiping Zhong , Xiaowen Tong

DOI: 10.1007/978-3-540-71093-6_5

关键词:

摘要: Intrusion Detection System (IDS) is usually regarded as the second secure defense of network. However, traditional IDS cannot be suitable to deploy in Wireless Sensor Networks (WSN) because nature WSN (e.g. self-origination, resource-constraint, etc). In this paper, we propose a kind three-logic-layer architecture (IDS)-SAID by employing agent technology and thought immune mechanism. It has two work modes: 1) active mode improve effectiveness intelligence for unknown attacks; 2) passive detect defend known attacks. The basic functions these three layers, intrusion response, evolution approach knowledge base are also presented paper. Furthermore, take advantages local detection system distributive & cooperative have tradeoff among security communication overhead. We design kinds light-weight agents: monitor agents, decision agents order reduce overhead, computation complexity memory cost. analysis experiment result illustrate that SAID nice properties attacks, WSN.

参考文章(13)
Bernard Jouga, Ricardo Staciarini Puttini, Patrick Albers, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. Wireless Information Systems. pp. 1- 12 ,(2002)
Christopher Krügel, Thomas Toth, Applying Mobile Agent Technology to Intrusion Detection ,(2001)
Tansu Alpcan, Tamer Basar, A game theoretic approach to decision and analysis in network intrusion detection conference on decision and control. ,vol. 3, pp. 2595- 2600 ,(2003) , 10.1109/CDC.2003.1273013
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
Chien-Chung Su, Ko-Ming Chang, Yau-Hwang Kuo, Mong-Fong Horng, The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] wireless communications and networking conference. ,vol. 4, pp. 1927- 1932 ,(2005) , 10.1109/WCNC.2005.1424814
A. Siraj, R.B. Vaughn, S.M. Bridges, Intrusion sensor data fusion in an intelligent intrusion detection system architecture hawaii international conference on system sciences. ,vol. 10, pp. 90279- ,(2004) , 10.1109/HICSS.2004.1265658
A. Agah, S.K. Das, K. Basu, A game theory based approach for security in wireless sensor networks international performance, computing, and communications conference. pp. 259- 263 ,(2004) , 10.1109/PCCC.2004.1394995
Chris Karlof, David Wagner, Secure routing in wireless sensor networks: attacks and countermeasures Ad Hoc Networks. ,vol. 1, pp. 293- 315 ,(2003) , 10.1016/S1570-8705(03)00008-8
O. Kachirski, R. Guha, Effective intrusion detection using multiple sensors in wireless ad hoc networks hawaii international conference on system sciences. pp. 57- ,(2003) , 10.1109/HICSS.2003.1173873
P.K. Harmer, P.D. Williams, G.H. Gunsch, G.B. Lamont, An artificial immune system architecture for computer security applications IEEE Transactions on Evolutionary Computation. ,vol. 6, pp. 252- 280 ,(2002) , 10.1109/TEVC.2002.1011540