On the negative selection and the danger theory inspired security for heterogeneous networks

Fazirulhisyam Hashim, Kumudu MUNASINGHE, Abbas Jamalipour

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Aspirations for a boundless communication paradigm for future generation networks have changed the conventional way of looking at network security. With such a vision, security techniques should not only be securing local end-users but also be protecting entire networks from malicious adversaries. Unfortunately, providing security protection for such gigantic networks is a very challenging task. Based on the analogous relationships of various cell interactions in a metabolic network and a complex heterogeneous network, we explore the possibilities of human immune system (HIS) inspired anomaly detection for protecting inter-worked heterogeneous networks. In light of this, the applicability of two key schools of thought on how the HIS detects anomalies; namely, the Negative Selection (NS) and the Danger Theory (DT) are discussed in this article. While the NS theory is the traditional understanding of anomaly detection in the HIS, the DT is a radical new concept that challenges the main fundamentals of the NS theory, which is currently being hotly debated among immunologists. Based on this, the article highlights the applicability and the limitations of these two theories in detecting malicious anomalies in heterogeneous networks. From our analysis, we establish a doctrine that the DT outperforms its counterpart (the NS theory) in detecting anomalies in a complex heterogeneous network. Our analysis also indicates that the DT inspired anomaly detection is efficient in detecting malicious network adversaries and updating network segments that are under attack, thereby increasing the survivability of heterogeneous networks
Original languageEnglish
Pages (from-to)74-84
Number of pages11
JournalIEEE Wireless Communications Magazines
Volume19
Issue number3
DOIs
Publication statusPublished - 2012
Externally publishedYes

Fingerprint

Heterogeneous networks
Immune system
Complex networks
Network security
Communication

Cite this

@article{947493fe0cc34b318ea822f709e42471,
title = "On the negative selection and the danger theory inspired security for heterogeneous networks",
abstract = "Aspirations for a boundless communication paradigm for future generation networks have changed the conventional way of looking at network security. With such a vision, security techniques should not only be securing local end-users but also be protecting entire networks from malicious adversaries. Unfortunately, providing security protection for such gigantic networks is a very challenging task. Based on the analogous relationships of various cell interactions in a metabolic network and a complex heterogeneous network, we explore the possibilities of human immune system (HIS) inspired anomaly detection for protecting inter-worked heterogeneous networks. In light of this, the applicability of two key schools of thought on how the HIS detects anomalies; namely, the Negative Selection (NS) and the Danger Theory (DT) are discussed in this article. While the NS theory is the traditional understanding of anomaly detection in the HIS, the DT is a radical new concept that challenges the main fundamentals of the NS theory, which is currently being hotly debated among immunologists. Based on this, the article highlights the applicability and the limitations of these two theories in detecting malicious anomalies in heterogeneous networks. From our analysis, we establish a doctrine that the DT outperforms its counterpart (the NS theory) in detecting anomalies in a complex heterogeneous network. Our analysis also indicates that the DT inspired anomaly detection is efficient in detecting malicious network adversaries and updating network segments that are under attack, thereby increasing the survivability of heterogeneous networks",
keywords = "Mobile, Wireless, Network",
author = "Fazirulhisyam Hashim and Kumudu MUNASINGHE and Abbas Jamalipour",
year = "2012",
doi = "10.1109/MWC.2012.6231162",
language = "English",
volume = "19",
pages = "74--84",
journal = "IEEE Wireless Communications",
issn = "1070-9916",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
number = "3",

}

On the negative selection and the danger theory inspired security for heterogeneous networks. / Hashim, Fazirulhisyam; MUNASINGHE, Kumudu; Jamalipour, Abbas.

In: IEEE Wireless Communications Magazines, Vol. 19, No. 3, 2012, p. 74-84.

Research output: Contribution to journalArticle

TY - JOUR

T1 - On the negative selection and the danger theory inspired security for heterogeneous networks

AU - Hashim, Fazirulhisyam

AU - MUNASINGHE, Kumudu

AU - Jamalipour, Abbas

PY - 2012

Y1 - 2012

N2 - Aspirations for a boundless communication paradigm for future generation networks have changed the conventional way of looking at network security. With such a vision, security techniques should not only be securing local end-users but also be protecting entire networks from malicious adversaries. Unfortunately, providing security protection for such gigantic networks is a very challenging task. Based on the analogous relationships of various cell interactions in a metabolic network and a complex heterogeneous network, we explore the possibilities of human immune system (HIS) inspired anomaly detection for protecting inter-worked heterogeneous networks. In light of this, the applicability of two key schools of thought on how the HIS detects anomalies; namely, the Negative Selection (NS) and the Danger Theory (DT) are discussed in this article. While the NS theory is the traditional understanding of anomaly detection in the HIS, the DT is a radical new concept that challenges the main fundamentals of the NS theory, which is currently being hotly debated among immunologists. Based on this, the article highlights the applicability and the limitations of these two theories in detecting malicious anomalies in heterogeneous networks. From our analysis, we establish a doctrine that the DT outperforms its counterpart (the NS theory) in detecting anomalies in a complex heterogeneous network. Our analysis also indicates that the DT inspired anomaly detection is efficient in detecting malicious network adversaries and updating network segments that are under attack, thereby increasing the survivability of heterogeneous networks

AB - Aspirations for a boundless communication paradigm for future generation networks have changed the conventional way of looking at network security. With such a vision, security techniques should not only be securing local end-users but also be protecting entire networks from malicious adversaries. Unfortunately, providing security protection for such gigantic networks is a very challenging task. Based on the analogous relationships of various cell interactions in a metabolic network and a complex heterogeneous network, we explore the possibilities of human immune system (HIS) inspired anomaly detection for protecting inter-worked heterogeneous networks. In light of this, the applicability of two key schools of thought on how the HIS detects anomalies; namely, the Negative Selection (NS) and the Danger Theory (DT) are discussed in this article. While the NS theory is the traditional understanding of anomaly detection in the HIS, the DT is a radical new concept that challenges the main fundamentals of the NS theory, which is currently being hotly debated among immunologists. Based on this, the article highlights the applicability and the limitations of these two theories in detecting malicious anomalies in heterogeneous networks. From our analysis, we establish a doctrine that the DT outperforms its counterpart (the NS theory) in detecting anomalies in a complex heterogeneous network. Our analysis also indicates that the DT inspired anomaly detection is efficient in detecting malicious network adversaries and updating network segments that are under attack, thereby increasing the survivability of heterogeneous networks

KW - Mobile

KW - Wireless

KW - Network

U2 - 10.1109/MWC.2012.6231162

DO - 10.1109/MWC.2012.6231162

M3 - Article

VL - 19

SP - 74

EP - 84

JO - IEEE Wireless Communications

JF - IEEE Wireless Communications

SN - 1070-9916

IS - 3

ER -