首页 | 本学科首页   官方微博 | 高级检索  
     

AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS
作者姓名:Yi  Ping  Zhong  Yiping  Zhang  Shiyong
作者单位:Department of Computing and Information Technology, Fudan University, Shanghai 200433, China
基金项目:Supported by the National High Technology Development 863 Program of China (No.2003AA148010) and Key Technologies R&D Program of China (No.2002DA103A03 - 07).
摘    要:This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.

关 键 词:免疫系统  入侵检测  移动代理  移动通信网络  网络安全
收稿时间:2004-08-16
修稿时间:2005-01-05

An immunity-based security architecture for mobile ad hoc networks
Yi Ping Zhong Yiping Zhang Shiyong.AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS[J].Journal of Electronics,2006,23(3):417-422.
Authors:Ping Yi  Yiping Zhong  Shiyong Zhang
Affiliation:Department of Computing and Information Technology, Fudan University, Shanghai 200433, China
Abstract:This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.
Keywords:Immune system  Intrusion detection  Mobile agent  Mobile ad hoc network  Network security
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《电子科学学刊(英文版)》浏览原始摘要信息
点击此处可从《电子科学学刊(英文版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号