메뉴 건너뛰기




Volumn 16, Issue 5, 2005, Pages 1076-1087

An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks

Author keywords

Ad hoc; Adaptive; Artificial; Clonal selection; Detection; Immune; Learning; Misbehavior; Mobile

Indexed keywords

ADAPTIVE SYSTEMS; COMPUTER SIMULATION; LEARNING ALGORITHMS; LEARNING SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; NEURAL NETWORKS; ROUTERS; TELECOMMUNICATION NETWORKS;

EID: 26844569805     PISSN: 10459227     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNN.2005.853419     Document Type: Article
Times cited : (87)

References (23)
  • 1
    • 0034541756 scopus 로고    scopus 로고
    • "Mitigating routing misbehavior in mobile ad hoc networks"
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. MOBICOM '00, 2000, pp. 255-265.
    • (2000) Proc. MOBICOM '00 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 2
    • 15344340908 scopus 로고    scopus 로고
    • "A robust reputation system for mobile ad hoc networks"
    • Lausanne, Switzerland, Tech. Rep. IC/2003/50, EPFL-DI-ICA, Jul.
    • S. Buchegger and J.-Y. Le Boudec, "A robust reputation system for mobile ad hoc networks,", Lausanne, Switzerland, Tech. Rep. IC/2003/ 50, EPFL-DI-ICA, Jul. 2003.
    • (2003)
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 3
    • 0242696192 scopus 로고    scopus 로고
    • "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad hoc networks"
    • Lausanne, Switzerland, Jun.
    • S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad hoc networks," in Proc. IEEE/ACM Symp. Mobile Ad hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, Jun. 2002, pp. 80-91.
    • (2002) Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC) , pp. 80-91
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 5
    • 26844438249 scopus 로고    scopus 로고
    • "An artificial immune system approach to misbehavior detection in mobile ad hoc networks"
    • Lausanne, Switzerland, Tech. Rep. IC/2003/59, EPFL-DI-ICA, Sep.
    • J. Y. Le Boudec and S. Sarafijanovic, "An artificial immune system approach to misbehavior detection in mobile ad hoc networks", Lausanne, Switzerland, Tech. Rep. IC/2003/59, EPFL-DI-ICA, Sep. 2003.
    • (2003)
    • Le Boudec, J.Y.1    Sarafijanovic, S.2
  • 6
    • 35048854187 scopus 로고    scopus 로고
    • "An artificial immune system for misbehavior detection in mobile ad hoc networks with virtual thymus, clustering, danger signal and memory detectors"
    • Catania, Italy, Sep.
    • S. Sarafijanovic and J. Y. Le Boudec, "An artificial immune system for misbehavior detection in mobile ad hoc networks with virtual thymus, clustering, danger signal and memory detectors," in Proc. ICARIS'04 3rd Int. Conf. Artificial Immune Systems, Catania, Italy, Sep. 2004, pp. 342-356.
    • (2004) Proc. ICARIS'04 3rd Int. Conf. Artificial Immune Systems , pp. 342-356
    • Sarafijanovic, S.1    Le Boudec, J.Y.2
  • 7
    • 0003496659 scopus 로고    scopus 로고
    • "An immunological model of distributed detection and it's application to computer security"
    • Ph.D. dissertation, Dept. Comput. Sci., Univ. New Mexico, Apr.
    • S. A. Hofmeyr, "An immunological model of distributed detection and it's application to computer security," Ph.D. dissertation, Dept. Comput. Sci., Univ. New Mexico, Apr. 1999.
    • (1999)
    • Hofmeyr, S.A.1
  • 8
    • 0002467033 scopus 로고    scopus 로고
    • "Architecture for an artificial immune system"
    • S. A. Hofmeyr and S. Forrest, "Architecture for an artificial immune system," Evolut. Computat., vol. 7, no. 1, pp. 45-68, 2000.
    • (2000) Evolut. Computat. , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.A.1    Forrest, S.2
  • 9
    • 0038458266 scopus 로고    scopus 로고
    • "Evaluating negative selection in an artificial immune system for network intrusion detection"
    • San Francisco, CA, Jul. 7-11
    • J. Kim and P. J. Bentley, "Evaluating negative selection in an artificial immune system for network intrusion detection" in Proc. Genetic and Evolutionary Computation Conf. (GECCO'01), San Francisco, CA, Jul. 7-11, pp. 1330-1337.
    • Proc. Genetic and Evolutionary Computation Conf. (GECCO'01) , pp. 1330-1337
    • Kim, J.1    Bentley, P.J.2
  • 10
    • 0034870039 scopus 로고    scopus 로고
    • "The artificial immune system for network intrusion detection: An investigation of clonal selection with negative selection operator"
    • May 27-30
    • J. Kim and P. J. Bentley, "The artificial immune system for network intrusion detection: An investigation of clonal selection with negative selection operator," Proc. Cong. Evolutionary Computation (CEC'01), pp. 1244-1252, May 27-30.
    • Proc. Cong. Evolutionary Computation (CEC'01) , pp. 1244-1252
    • Kim, J.1    Bentley, P.J.2
  • 11
    • 84901408225 scopus 로고    scopus 로고
    • "Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection"
    • May 12-17
    • J. Kim and P. J. Bentley, "Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection," Proc. Congr. Evolutionary Computation (CEC'02), pp. 1015-1020, May 12-17, 2002.
    • (2002) Proc. Congr. Evolutionary Computation (CEC'02) , pp. 1015-1020
    • Kim, J.1    Bentley, P.J.2
  • 13
    • 0028201732 scopus 로고
    • "Tolerance, danger and the extended family"
    • P. Matzinger, "Tolerance, danger and the extended family," Annu. Rev. Immunology, vol. 12, pp. 991-1045, 1994.
    • (1994) Annu. Rev. Immunology , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 14
    • 0034956209 scopus 로고    scopus 로고
    • "The danger model in it's historical contex"
    • P. Matzinger, "The danger model in it's historical contex," Scandinavian J. Immunology, vol. 54, pp. 4-9, 2001.
    • (2001) Scandinavian J. Immunology , vol.54 , pp. 4-9
    • Matzinger, P.1
  • 16
    • 0141991983 scopus 로고    scopus 로고
    • "Order from disorder sprung: Recognition and regulation in the immune system"
    • May
    • T. W. Mak, "Order from disorder sprung: Recognition and regulation in the immune system," Phil. Trans. R. Soc. Lond. A, vol. 361, pp. 1235-1250, May 2003.
    • (2003) Phil. Trans. R. Soc. Lond. A , vol.361 , pp. 1235-1250
    • Mak, T.W.1
  • 20
    • 0004125427 scopus 로고    scopus 로고
    • "Artificial immune systems: Part I basic theory and applications"
    • Tech. Rep. RT DCA 01/99
    • L. N. De Castro and F. J. Von Zuben, "Artificial immune systems: Part I basic theory and applications,", Tech. Rep. RT DCA 01/99, 1999.
    • (1999)
    • De Castro, L.N.1    Von Zuben, F.J.2
  • 22
    • 0036613083 scopus 로고    scopus 로고
    • "An immunity-based technique to characterize intrusions in computer networks"
    • Jun.
    • D. Dasgupta and F. González, "An immunity-based technique to characterize intrusions in computer networks," IEEE Trans. Evol. Comput., vol. 6, no. 9, pp. 1081-1088, Jun. 2002.
    • (2002) IEEE Trans. Evol. Comput. , vol.6 , Issue.9 , pp. 1081-1088
    • Dasgupta, D.1    González, F.2
  • 23
    • 85084164032 scopus 로고    scopus 로고
    • "Automated Response Using System-Call Delays"
    • Denver, CO, Aug.
    • A. Somayaji and S. Forrest, "Automated Response Using System-Call Delays," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000, pp. 185-197.
    • (2000) Proc. 9th USENIX Security Symp. , pp. 185-197
    • Somayaji, A.1    Forrest, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.