An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique

被引:86
作者
Shamshirband, Shahaboddin [1 ,2 ]
Anuar, Nor Badrul [1 ,2 ]
Kiah, Miss Laiha Mat [1 ,2 ]
Patel, Ahmed [3 ,4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur, Malaysia
[2] Univ Malaya, Secur Res Grp SECReg, Kuala Lumpur, Malaysia
[3] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Software Technol & Management SOFTAM, Sch Comp Sci, Ukm Bangi 43600, Selangor Darul, Malaysia
[4] Univ Kingston, Fac Sci Engn & Comp, Sch Comp & Informat Syst, Kingston Upon Thames KT1 2EE, Surrey, England
关键词
Computational intelligence; Multi-agent systems; Wireless sensor networks; Intrusion detection and; prevention systems (IDPS); Collaborative IDPS; Cloud computing; SENSOR NETWORKS; AGENT; ALGORITHM; STRATEGY;
D O I
10.1016/j.engappai.2013.04.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of wireless sensor networks and mobile ad-hoc networks in applications such as emergency services, warfare and health monitoring poses the threat of various cyber hazards, intrusions and attacks as a consequence of these networks' openness. Among the most significant research difficulties in such networks safety is intrusion detection, whose target is to distinguish between misuse and abnormal behavior so as to ensure secure, reliable network operations and services. Intrusion detection is best delivered by multi-agent system technologies and advanced computing techniques. To date, diverse soft computing and machine learning techniques in terms of computational intelligence have been utilized to create Intrusion Detection and Prevention Systems (IDPS), yet the literature does not report any state-of-the-art reviews investigating the performance and consequences of such techniques solving wireless environment intrusion recognition issues as they gain entry into cloud computing. The principal contribution of this paper is a review and categorization of existing IDPS schemes in terms of traditional artificial computational intelligence with a multi-agent support. The significance of the techniques and methodologies and their performance and limitations are additionally analyzed in this study, and the limitations are addressed as challenges to obtain a set of requirements for IDPS in establishing a collaborative-based wireless IDPS (Co-WIDPS) architectural design. It amalgamates a fuzzy reinforcement learning knowledge management by creating a far superior technological platform that is far more accurate in detecting attacks. In conclusion, we elaborate on several key future research topics with the potential to accelerate the progress and deployment of computational intelligence based Co-WIDPSs. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2105 / 2127
页数:23
相关论文
共 102 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]   A parallel genetic local search algorithm for intrusion detection in computer networks [J].
Abadeh, Mohammad Saniee ;
Habibi, Jafar ;
Barzegar, Zeynab ;
Sergi, Muna .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (08) :1058-1069
[3]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[4]   Intrusion detection in sensor networks: A non-cooperative game approach [J].
Agah, A ;
Das, SK ;
Basu, K ;
Asadi, M .
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, :343-346
[5]  
Agah A., 2007, INT J NETWORK SECURI, V5, P145
[6]   Cooperative Q-learning: the knowledge sharing issue [J].
Ahmadabadi, MN ;
Asadpour, M ;
Nakano, E .
ADVANCED ROBOTICS, 2001, 15 (08) :815-832
[7]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[8]  
Alpadin E., 2010, Introduction to Machine Learning
[9]   EXPERIMENTS WITH ONLINE REINFORCEMENT LEARNING IN REAL-TIME STRATEGY GAMES [J].
Andersen, Kresten Toftgaard ;
Zeng, Yifeng ;
Christensen, Dennis Dahl ;
Tran, Dung .
APPLIED ARTIFICIAL INTELLIGENCE, 2009, 23 (09) :855-871
[10]  
Anderson D., 1995, Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system nides