Paper Title:
An Artificial Immune-Based Distributed Intrusion Detection Model for the Internet of Things
  Abstract

Traditional detection technology for network attacks is difficult to adapt the complicated and changeful environment of the Internet of Things (IoT). In the interest of resolving the distributed intrusion detection problem of IoT, this paper proposes an artificial immune-based theory model for distributed intrusion detection in IoT. Artificial immune principles are used to solve the problem of IoT intrusion detection. Antigen, self, non-self and detector in the IoT environment are defined. Good immune mechanisms are simulated. Detector is evolved dynamically to make the proposed model have self-learning and self-adaptation. The outstanding detectors which have accepted training are shared in the whole IoT to adapt the local IoT environment and improve the ability of global intrusion detection in IoT. The proposed model is expected to realize detecting intrusion of IoT in distribution and parallelity.

  Info
Periodical
Chapter
Chapter 1: Material Engineering and its Application
Edited by
Helen Zhang and David Jin
Pages
165-168
DOI
10.4028/www.scientific.net/AMR.366.165
Citation
R. Chen, C. M. Liu, C. Chen, "An Artificial Immune-Based Distributed Intrusion Detection Model for the Internet of Things", Advanced Materials Research, Vol. 366, pp. 165-168, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Rong Deng, Xiu Yin Zhang
Abstract:In this article an Immune Based Intrusion Detection Model (IBIDM) was built to simulate the dynamic relationships between the intrusion...
482
Authors: Tao Yang, Hong Li Deng, Wen Chen, Zhe Wang
Abstract:The efficiency of traditional negative selection algorithm is too low to be applied. In our algorithm before the detector creation process,...
3200
Authors: Yu Hu, Ling Zheng
Abstract:This paper describes a model of immune intrusion detection in which an independent form is introduced in. Immune intrusion detection receives...
636
Authors: Rong Hua Hu, Pei Huang Lou, Peng Zhao
Chapter 7: Computer Application in Design and Manufacturing (1)
Abstract:The detector sets generated by Real-Valued Negative Selection Algorithm (RNSA) are usually numerous, without optimization, and can not work...
3736
Authors: Cai Ming Liu, Yan Zhang, Run Chen, Lu Xin Xiao, Jian Dong Zhang
Chapter 16: Auto-Detection Technology
Abstract:The fast development of the Internet of Things (IoT) makes its security problems appear gradually. It is urgent to study the intrusion...
1982