2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies 2014
DOI: 10.1109/icesc.2014.73
|View full text |Cite
|
Sign up to set email alerts
|

An Agent Based Intrusion Detection System for Wireless Network with Artificial Immune System (AIS) and Negative Clone Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Two popular approaches for distributing the computation of intrusion detection among the network nodes are biologically inspired techniques and trust-based techniques. Biologically inspired IDS try to create a complex global response to an attack from simple local interactions of network nodes, as in swarm intelligence-based techniques [17][18][19], and artificial immune systems-based approaches [20,21]. Trust-based techniques tend to have good attack-detection performance at the expense of increasing the bandwidth due to the required information exchange (e.g., trust metrics) among neighboring nodes [22][23][24].…”
Section: Network Intrusion Detection Systems For Rwnmentioning
confidence: 99%
“…Two popular approaches for distributing the computation of intrusion detection among the network nodes are biologically inspired techniques and trust-based techniques. Biologically inspired IDS try to create a complex global response to an attack from simple local interactions of network nodes, as in swarm intelligence-based techniques [17][18][19], and artificial immune systems-based approaches [20,21]. Trust-based techniques tend to have good attack-detection performance at the expense of increasing the bandwidth due to the required information exchange (e.g., trust metrics) among neighboring nodes [22][23][24].…”
Section: Network Intrusion Detection Systems For Rwnmentioning
confidence: 99%
“…Kumar and Reddy [6] identified that wireless networks had intrusions both at packet and signal levels and it could be simple and too complex unlike IP networks. Conventional techniques may be unsuccessful in wireless network due to the complexity of identifying intrusions at different levels and variation in credentials at different nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Conventional techniques which are used for intrusion detection fail in wireless networks. Hence, an agent based technique is proposed for gathering information from various nodes with an evolutionary artificial immune system for the detection of intrusion and preventing the same over the intrusive paths [6].…”
Section: Related Work Intrusion Detectionmentioning
confidence: 99%