Proc. SPIE. 7344, Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009
KEYWORDS: Defense and security, Computing systems, Artificial intelligence, Computer intrusion detection, Information security, Computer security, Information operations, Mobile communications, Network security, RGB color model
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat
operations. Their open and shared communication medium enables new forms of attack that are not applicable for
traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the
new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work
in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate
routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results
indicate that the approach is successful in routing network traffic around compromised computers.
MANET (Mobile Ad hoc Network) environments are becoming increasingly important as potential users recognize
the benefits of being able to create a functional network using little or no fixed infrastructure. Unfortunately,
the very properties that provide such flexibility also cause significant complications in terms of security. The
collaborative nature of the system combined with its continual state of flux requires solutions that are highly
dynamic, and that can adapt to massive changes in system resources, traffic patterns and network topology.
In this paper, we outline a new approach to MANET security called BITSI (the Biologically-Inspired Tactical
Security Infrastructure). BITSI is based upon the concepts of Artificial Immune Systems and Danger Theory.
After introducing the motivations for BITSI we provide a brief description of its underlying theories and proposed
architecture. Two experiments conducted within our MANET simulator are described, and we demonstrate that
BITSI can detect and respond to certain classes of Denial of Service attacks. Finally, we describe our future
plans for BITSI, and how its approach can be combined with other, more traditional, security solutions.