An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks

  • Ki-Won Yeom
  • Ji-Hyung Park
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)


Many single points of failure exist in an intrusion detection system (IDS) based on a hierarchical architecture that does not have redundant communication lines and the capability to dynamically reconfigure relationships in the case of failure of key components. To solve this problem, we propose an IDS inspired by the human immune system based upon several mobile agents. The mobile agents act similarly to white blood cells of the immune system and travel from host to host in the network to detect any intrusions. As in the immune system, intrusions are detected by distinguishing between "self" and "non-self", or normal and abnormal process behavior respectively. In this paper we present our model, and show how mobile agent and artificial immune paradigms can be used to design efficient intrusion detection systems. We also discuss the validation of our model followed by a set of experiments we have carried out to evaluate the performance of our model using realistic case studies.


Intrusion Detection Mobile Agent Intrusion Detection System Artificial Immune System Human Immune System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE symposium on security and privacy (2001)Google Scholar
  2. 2.
    Crispin, C., Steve, B., John, J., Perry, W.: Pointguard - Protecting pointers from buer over vulnerabilities. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C. (2003)Google Scholar
  3. 3.
    Barrantes, E.G., Ackley, D.H., Forrest, S., Palmer, T.S., et al.: Randomized instruction set emulation to disrupt binary code injection attacks. In: Proceeding of the 10th ACM Conference on Computer and Communications Security (2003)Google Scholar
  4. 4.
    Jon, G., Somesh, J., Bart, M.: Efficient context-sensitive intrusion detection. In: Network and Distributed System Security Symposium (2004)Google Scholar
  5. 5.
    Percus, J.K., Percus, O.E., Alan, S.P.: Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self non-self discrimination. Proceedings of the National Academy of Sciences of the United States of America 90, 1691–1695 (1993)CrossRefGoogle Scholar
  6. 6.
    Jansen, W.: Intrusion detection with mobile agents. Computer Communications 25(15), 1392–1401 (2002)CrossRefGoogle Scholar
  7. 7.
    Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10) (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ki-Won Yeom
    • 1
  • Ji-Hyung Park
    • 1
  1. 1.CAD/CAM Research CenterKorea Institute of Science and TechnologySeoulKorea

Personalised recommendations