Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques
Tóm tắt
Từ khóa
Tài liệu tham khảo
U. Aickelin and S. Cayzer, The danger theory and its application to artificial immune systems, 1st International Conference on Artificial Immune Systems, Canterbury, pp. 141–148, 2002.
U. Aickelin, Artificial immune system and intrusion detection tutorial, Introductory Tutorials in Optimization, Search and Decision Support Methodologies, Nottingham, UK, 2003.
S. Bachmayer, Artificial Immune Systems, Department of Computer Science, University of Helsinki, Helsinki, 2008.
A. Barbosa, Intrusion Detection Systems—Seminaries Ravel—CPS760, 2000, http://www.lockabit.coppe.ufrj.br/downloads/academicos/IDS.pdf .
CROSSBOW, Crossbow Technology, http://www.xbow.com/ , Accessed April, 2010.
A. Da Silva et al., Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, New York, 2005.
H. Debar, et al., Towards a taxonomy of intrusion-detection systems, Computer Networks, Vol. 31, pp. 805–822, 1999.
I. Dietrich and F. Dressler, On the lifetime of wireless sensor networks, ACM Transactions on Sensor Networks, Vol. 5, No. 1, pp. 1–39, 2009.
M. Drozda et al., AIS for misbehavior detection in wireless sensor networks: performance and design principles, IEEE Congress on Evolutionary Computation, Singapore, pp. 3719–3726, 2007.
P. García-Teodoro, et al., Anomaly-based network intrusion detection: techniques, systems and challenges, Computers & Security, Vol. 28, pp. 18–28, 2008.
J. Greensmith et al., Detecting danger: applying a novel immunological concept to intrusion detection systems, 4th International Conference on Artificial Immune Systems (ICARIS-05), 2005.
L. Hong and J. Yang, Danger theory of immune systems and intrusion detection systems, International Conference on Industrial Mechatronics and Automation, Chengdu, pp. 208–211, 2009.
J. Kim et al., Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm, Artificial Immune Systems, Vol. 4163, Springer, Berlin, pp. 390–403, 2006.
Y. Liu and F. Yu, Immunity-based intrusion detection for wireless sensor networks, Neural Networks, IJCNN, pp. 439–444, 2008.
D. Martynov et al., Design and implementation of an intrusion detection system for wireless sensor networks, IEEE International Conference on Electro/Information Technology, Chicago, pp. 507–512, 2007.
P. Matzinger, The danger model: a renewed sense of self, Science, Vol. 296, No. 5566, pp. 301–305, 2002.
I. Onat and A. MIRI, An intrusion detection system for wireless sensor networks, Proceeding of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol. 3, Canada, pp. 253–259, 2005.
R. Roman et al., Applying intrusion detection systems to wireless sensor networks, 3rd Consumer Communications and Networking Conference, Vol. 1, pp. 640–644, 2006.
G. Silva, Intrusion detection in computer networks: immune-inspired algorithm based in the danger theory and the dendritic cells, Master Thesis, Federal University of Minas Gerais, March 2009.
J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, University of NottinghamNottingham, 2004.
C. Wallenta, et al., Detecting interest cache poisoning in sensor networks using an artificial immune algorithm, Applied Intelligence, Vol. 32, No. 1, pp. 1–26, 2010.
W. Xu et al., The feasibility of launching and detecting jamming attacks in wireless networks, 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, pp. 46–57, 2005.