Cart (Loading....) | Create Account
Close category search window
 

On the negative selection and the danger theory inspired security for heterogeneous networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hashim, F. ; Univ. of Sydney, Sydney, NSW, Australia ; Munasinghe, K.S. ; Jamalipour, A.

Aspirations for a boundless communication paradigm for future generation networks have changed the conventional way of looking at network security. With such a vision, security techniques should not only be securing local end-users but also be protecting entire networks from malicious adversaries. Unfortunately, providing security protection for such gigantic networks is a very challenging task. Based on the analogous relationships of various cell interactions in a metabolic network and a complex heterogeneous network, we explore the possibilities of human immune system (HIS) inspired anomaly detection for protecting interworked heterogeneous networks. In light of this, the applicability of two key schools of thought on how the HIS detects anomalies; namely, the Negative Selection (NS) and the Danger Theory (DT) are discussed in this article. While the NS theory is the traditional understanding of anomaly detection in the HIS, the DT is a radical new concept that challenges the main fundamentals of the NS theory, which is currently being hotly debated among immunologists. Based on this, the article highlights the applicability and the limitations of these two theories in detecting malicious anomalies in heterogeneous networks. From our analysis, we establish a doctrine that the DT outperforms its counterpart (the NS theory) in detecting anomalies in a complex heterogeneous network. Our analysis also indicates that the DT inspired anomaly detection is efficient in detecting malicious network adversaries and updating network segments that are under attack, thereby increasing the survivability of heterogeneous networks.

Published in:

Wireless Communications, IEEE  (Volume:19 ,  Issue: 3 )

Date of Publication:

June 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.