Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Intrusion detection using sequences of system calls
Journal of Computer Security
Hi-index | 0.00 |
Mobile Ad Hoc Networks are vulnerable to security attacks that aim at disrupting routing information, exhausting nodes resources, maliciously manipulating data traffic etc. Construction of security mechanisms for Mobile Ad Hoc Networks is complicated by the fact that they lack a network infrastructure and a central authority for authentication and distribution of cryptographic keys. In this paper is presented a theoretical model of an Artificial Immune System inspired by the vertebrate immune system. The objective of the proposed AIS is protection and reaction against known and unknown dysfunctions or attacks in a Mobile Ad Hoc Network that uses IPv6 addresses. This AIS also includes features inspired by Danger Theory, one of the latest immunological findings and a point of hot debate in the area of immunology.