An Artificial Immune-Based Distributed Intrusion Detection Model for the Internet of Things

Article Preview

Abstract:

Traditional detection technology for network attacks is difficult to adapt the complicated and changeful environment of the Internet of Things (IoT). In the interest of resolving the distributed intrusion detection problem of IoT, this paper proposes an artificial immune-based theory model for distributed intrusion detection in IoT. Artificial immune principles are used to solve the problem of IoT intrusion detection. Antigen, self, non-self and detector in the IoT environment are defined. Good immune mechanisms are simulated. Detector is evolved dynamically to make the proposed model have self-learning and self-adaptation. The outstanding detectors which have accepted training are shared in the whole IoT to adapt the local IoT environment and improve the ability of global intrusion detection in IoT. The proposed model is expected to realize detecting intrusion of IoT in distribution and parallelity.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

165-168

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, Geneva: ITU (2005)

Google Scholar

[2] V. Oleshchuk: Internet of things and privacy preserving technologies, Proc. of 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark, pp.336-340 (2009)

DOI: 10.1109/wirelessvitae.2009.5172470

Google Scholar

[3] Y. Zhou, Y.G. Fang, Y.C. Zhang: Securing wireless sensor networks: a survey, IEEE Communications Surveys and Tutorials, Vol. 10, pp.6-28 (2008)

DOI: 10.1109/comst.2008.4625802

Google Scholar

[4] L. Mirowski, J. Hartnett: Deckard: A system to detect change of RFID tag ownership, International Journal of Computer Science and Network Security, Vol. 7, pp.89-98 (2007)

Google Scholar

[5] T. Li: Computer immunology, Beijing: Publishing House of Electronics Industry (2004)

Google Scholar

[6] H.W. Mo, X.Q. Zuo: Artificial Immune System, Beijing: Science Press (2009)

Google Scholar

[7] J. Kim, P.J. Bentley: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection, Proc. of the Congress on Evolutionary Computation, pp.1015-1020 (2002)

DOI: 10.1109/cec.2002.1004382

Google Scholar

[8] D. Dasgupta: An immunity-based technique to characterize intrusions in computer networks, IEEE Transactions on Evolutionary Computation, Vol. 6, pp.281-291 (2002)

DOI: 10.1109/tevc.2002.1011541

Google Scholar

[9] S. A. Hofmeyr: An immunological model of distributed detection and its application to computer security, New Mexico: Department of Computer Sciences, University of New Mexico (1999)

Google Scholar