TITLE

Collaborative RFID intrusion detection with an artificial immune system

AUTHOR(S)
Yang, Haidong; Guo, Jianhua; Deng, Feiqi
PUB. DATE
February 2011
SOURCE
Journal of Intelligent Information Systems;Feb2011, Vol. 36 Issue 1, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The current RFID systems are fragile to external attacks, due to the limitations of encryption authentication and physical protection methods used in implementation of RFID security systems. In this paper, we propose a collaborative RFID intrusion detection method that is based on an artificial immune system (AIS). The new method can enhance the security of RFID systems without need to amend the existing technical standards of RFID. Mimicking the immune cell collaboration in biological immune systems, RFID operations are defined as self and nonself antigens, representing legal and illegal RFID operations, respectively. Data models are defined for antigens' epitopes. Known RFID attacks are defined as danger signals represented by nonself antigens. We propose a method to collect RFID data for antigens and danger signals. With the antigen and danger signal data available, we use a negative selection algorithm to generate adaptive detectors for self antigens as RFID legal operations. We use an immune based clustering algorithm aiNet to generate collaborative detectors for danger signals of RFID intrusions. Simulation results have shown that the new RFID intrusion detection method has effectively reduced the false detection rate. The detection rate on known types of attacks was 98% and the detection rate on unknown type of attacks was 93%.
ACCESSION #
57053724

 

Related Articles

  • STLR: A Novel Danger Theory Based Structural TLR Algorithm. Azmi, Reza; Pishgoo, Boshra // ISeCure;Jul2013, Vol. 5 Issue 2, p209 

    Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which...

  • MAPPING HUMAN IMMUNE SYSTEM to NETWORK INTRUSION DETECTION SYSTEM. Qureshi, Farha Rafiq // International Journal on Computer Science & Engineering;2011 Supplement, p63 

    This paper describes the difference between the human immune system and network intrusion detection systems. The paper begins by briefly introducing existing intrusion detection systems (IDS's). An overview of the human immune system is presented and its salient features that can contribute to...

  • An AIS Inspired Alert Reduction Model. Mahboubian, Mohammad; Udzir, Nur Izura; Subramaniam, Shamala; Abdul Hamid, Nor Asila Wati // International Journal of Cyber-Security & Digital Forensics;Jun2012, Vol. 1 Issue 2, p130 

    One of the most important topics in the field of intrusion detection systems is to find a solution to reduce the overwhelming alerts generated by IDSs in the network. Inspired by danger theory which is one of the most important theories in artificial immune system (AIS) we proposed a...

  • Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm.  // International Journal of Computer Applications;Dec2010, Vol. 12, p7 

    The article integrates artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve intrusion detection problem in network systems. It develops a non-classification algorithm based on the danger theory model of human immune system (HIS)....

  • Principle and Application of Dendritic Cell Algorithm for Intrusion Detection. Xufei Zheng; Yonghui Fang // International Proceedings of Computer Science & Information Tech;2012, Vol. 48, p85 

    The Dendritic Cell Algorithm (DCA) is inspired by the function of the dendritic cells of the human immune system. In nature, dendritic cells are the intrusion detection agents of the human body, policing the tissue and organs for potential invaders in the form of pathogens. This paper describes...

  • Heterogeneous Time Variant Activity Pattern Based Artificial Network Immune System for Intrusion Detection. Vasanthi, S.; Chandrasekar, S. // Australian Journal of Basic & Applied Sciences;May2014, Vol. 8 Issue 7, p1 

    Real World applications become more sophisticated and require more adaptable solutions with higher security constraints. Providing such solution with higher security is a challenging task for the service providers where there is higher risk and frequency of different kind of network attacks...

  • INTRUSION DETECTION MODEL INSPIRED BY IMMUNE USING K-MEANS AND NAIVE BAYES AS A HYBRID LEARNING APPROACH. Farhan, Hazim A.; Naoum, Reyadh S.; Islim, Emad F. // International Journal of Academic Research;Jul2012, Vol. 4 Issue 4, p153 

    Intrusions in computer networks can be compared to human diseases with the difference that human body has an effective mechanism to deal with them. Human immune system (HIS) can detect and defend against unseen intruders. Also, it is distributed and adaptive. Human immune system is the most...

  • Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm. Aziz, Amira Sayed A.; Salama, Mostafa A.; Hassanien, Aboul ella; Hanafi, Sanaa El-Ola // Informatica (03505596);Dec2012, Vol. 36 Issue 4, p347 

    Computer security is an issue that will always be under investigation as intruders never stop to find ways to access data and network resources. Researches try to find functions and approaches that would increase chances to detect attacks and at the same time would be less expensive, regarding...

  • Intrusion Detection System Using Artificial Immune System and New Multi Core Technology. Bakla, Anas; El-Koutly, Rand // International Review on Computers & Software;May2013, Vol. 8 Issue 5, p1072 

    Intrusion detection systems (IDS) are nowadays very important for every IT company which is concerned with security and sensitive systems. A perfect IDS has still not been found and it stays a hot and challenging area in computer security research. Recently a new approach started to make its way...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics