Sistema de Detecção de Intrusão Imuno-inspirado customizado para Redes de Sensores Sem Fio
Abstract
In this work we propose an IDS framework inspired in the Human Immune System and a decentralized and customized version of the dendritic cell algorithm to be applied in the wireless sensor network context. Its basic feature is the nodes neighborhood monitoring and collaboration to identify an intruder. The work was experimentally evaluated in order to demonstrate its efficiency in detecting a denial-of-sleep attack.References
Aickelin, U. et al. (2003) “Danger Theory: The Link between AIS and IDS?”, Lecture Notes in Computer Science, v. 2787, páginas 147-155.
Becker M. et al. (2009) “On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks”, Journal of Computers, v. 4, número 5, Maio.
Crossbow (2010) “Crossbow Technology”, http://www.xbow.com/. Acessado em 2010.
García-Teodoro, P. et al. (2008) “Anomaly-based network intrusion detection: Techniques, systems and challenges”, Computers & Security, v. 28, páginas 18-28.
Greensmith, J. (2007) “The Dendritic Cell Algorithm”, PhD Thesis, University of Nottingham.
Greensmith, J. et al. (2005) “Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection”, 4th International Conference on Artificial Immune Systems, Canada.
Kim, J. et al. (2006) “Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm”, Artificial Immune Systems, Springer Berlin, v. 4163/2006, páginas 390-403.
Lebbe, M. et al. (2008) “Artificial Immune System inspired danger modelling in Wireless Mesh Networks”, Proceedings of the International Conference on Computer and Communication Engineering, Kuala Lumpur, páginas 984-988, Kuala Lumpur.
Liu, Y. e Yu, F. (2008) “Immunity-Based Intrusion Detection for Wireless Sensor Networks”, Neural Networks, IJCNN, páginas 439-444, 2008.
Matzinger, P. (2002) “The Danger Model: A Renewed Sense of Self”, Science, v. 296, número 5566, páginas 301-305,2002.
Silva, G. (2009). “Detecção de Intrusão em Redes de Computadores: Algoritmo Imunoinspirado Baseado na Teoria do Perigo e Células Dendríticas”, Tese de Mestrado, Programa de Pós-Graduação da Engenharia Elétrica, UFMG, 2009.
Yick, J. et al. (2008) “Wireless sensor network survey”, Computer Networks, número 52, p. 2292-2330.
Becker M. et al. (2009) “On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks”, Journal of Computers, v. 4, número 5, Maio.
Crossbow (2010) “Crossbow Technology”, http://www.xbow.com/. Acessado em 2010.
García-Teodoro, P. et al. (2008) “Anomaly-based network intrusion detection: Techniques, systems and challenges”, Computers & Security, v. 28, páginas 18-28.
Greensmith, J. (2007) “The Dendritic Cell Algorithm”, PhD Thesis, University of Nottingham.
Greensmith, J. et al. (2005) “Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection”, 4th International Conference on Artificial Immune Systems, Canada.
Kim, J. et al. (2006) “Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm”, Artificial Immune Systems, Springer Berlin, v. 4163/2006, páginas 390-403.
Lebbe, M. et al. (2008) “Artificial Immune System inspired danger modelling in Wireless Mesh Networks”, Proceedings of the International Conference on Computer and Communication Engineering, Kuala Lumpur, páginas 984-988, Kuala Lumpur.
Liu, Y. e Yu, F. (2008) “Immunity-Based Intrusion Detection for Wireless Sensor Networks”, Neural Networks, IJCNN, páginas 439-444, 2008.
Matzinger, P. (2002) “The Danger Model: A Renewed Sense of Self”, Science, v. 296, número 5566, páginas 301-305,2002.
Silva, G. (2009). “Detecção de Intrusão em Redes de Computadores: Algoritmo Imunoinspirado Baseado na Teoria do Perigo e Células Dendríticas”, Tese de Mestrado, Programa de Pós-Graduação da Engenharia Elétrica, UFMG, 2009.
Yick, J. et al. (2008) “Wireless sensor network survey”, Computer Networks, número 52, p. 2292-2330.
Published
2010-10-11
How to Cite
SALMON, Helio M.; FARIAS, Claudio M. de; PIRMEZ, Luci; ROSSETTO, Silvana; RODRIGUES, Paulo H. de A.; PIRMEZ, Rodrigo; DELICATO, Flávia C.; CARMO, Luiz F. R. da C..
Sistema de Detecção de Intrusão Imuno-inspirado customizado para Redes de Sensores Sem Fio. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 10. , 2010, Fortaleza.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2010
.
p. 269-282.
DOI: https://doi.org/10.5753/sbseg.2010.20593.
