Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@dana-edwards·
0.000 HBD
Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks
Introduction
============
![enter image description here](https://upload.wikimedia.org/wikipedia/commons/thumb/9/97/NetworkTopology-Mesh.svg/2000px-NetworkTopology-Mesh.svg.png)
Today we will examine the concept of the artificial immune system. In one of my previous blog posts I discussed biomimicry and how it relates to information security. We will revisit biomimicry in the form of artificial immune systems. I will reveal how DTNs (disruption tolerant network/delay tolerant networks) function and how they may be used to improve security in the Internet of Things. I will discuss a new whitepaper for an in development decentralized application called IOTA which utilizes DAGs. And finally I will combine all of these different technologies into an example of how it might in the near future converge to be used.
https://youtu.be/u2qRUtg2k3Y

>“The thesis presents nine design principles for the 
second generation’s artificial immune systems. The first 
principle is that artificial immune systems are represented 
as autonomous agents. The second principle states 
problems when AIS are represented as antigens or 
external (intrusion) signals. The third principle states that 
the aim of the second generation AIS is to maintain 
themselves and their environments. The fourth principle 
defines the functions of agents being to capture antigens, 
to process, to present, to recognize, to monitor, process 
and produce signals [4]. The fifth design principle states 
that agents have a life cycle. The sixth design principle 
states that agents communicate with the environment at 
multiple levels. The seventh design principle states that 
signals can be externally or internally produced. The eight 
design principle states that receptors can be specific, 
internal or external signals. Te last principle states that 
agents can specialize in specific tasks “  (Singh, 2015).

Using artificial immune systems for intrusion detection
=======================================================
![enter image description here](https://upload.wikimedia.org/wikipedia/commons/8/81/Network_based_intrusion_detection_system.png)
The design principles above show that you can represent an artificial immune system as autonomous agents. In the human body homeostasis must be maintained, and similarly in a network the equivalent of homeostasis must be maintained. Artificial immune systems in the context of network security can be used to detect an anomaly or intrusion (IDS) and then respond to the anomoly or intrusion (IRS). Just like with an immune system in the human body, when an intrusion is detected, then in real time the intrusion response system is activated, and from there an immune sequence takes place to neutralize the threat. In order to follow the architecture illustrated in Singh's paper, it would require a sensor network of secure autonomous agents, which are given the task of performing vulnerability analysis, intrusion detection, incident response and security management.

What are delay tolerant networking / disruption tolerant networks?
==================================================================
![enter image description here](https://upload.wikimedia.org/wikipedia/commons/4/4c/Leaky_bucket_as_a_meter-policing.JPG)
To provide clarity, depending on which circle you are in you may have heard DTNs referred to as either delay tolerant networks or disruption tolerant networks. Both of these different acronyms are equivalent in how they function, but disruption tolerant networking is favored by DARPA and connected groups.

**Video example**: https://www.youtube.com/watch?v=nWtRTzXJvtI

Disruption tolerant networking was developed for use in space and in military situations where connectivity might vary due to certain conditions, but where the delivery of the message is critical in spite of the fact that connectivity patterns vary. Ad-hoc mobile networks can benefit from a DTN, and these ad-hoc mobile networks can be incredibly resilient as they (the nodes) can be made up of drones, wearable computers, vehicles, all which may constantly be in motion, which have payloads which must wait until a peer is found which is capable of receiving it.

DTNs will be increasingly relevent in the Internet of Things era of computing because MANET (mobile ad-hock networks) and VANETs (vehicle ad-hock networks), will be among the “things” in the IoT.

What is Iota and why is it relevant?
====================================

Iota is a design for a micropayment platform. At this time it is unknown whether it will be a success, but from what is known about the project, it uses a DAG (directed acyclic graph) to allow for micropayments without a global blockchain. DAGs (directed acyclic graphs) are used to allow for the transmission of value over the Internet of Things. Iota uses a braid like structure but does not create a tree like structure and in doing this it doesn't require as much resources.

A graph can represent the nodes within an ad-hock network. The DAG can produce a casual graph which can function as an immutable history of the relationships between the nodes. In the case of transactions it may be possible to use a DAG to secure transactions by utilizing “cumulative weights” (Popov, 2015). It must be noted that Iota has not been tested and what is currently presented is theoretical rather than a practical empirical result.

What could we do with these technologies in combination?
============================================

Combining DTN, Iota and the artificial immune system approach to secrurity may produce some intriguing results. DTNs are incredibly resilient, useful for mobile networks within a city, and are useful for building ad-hock networks from which to utilize an IoT. Iota with it's experimental micropayments platform could allow for secure payments so that all mobile nodes in the ad-hock network can transmit value to pay a toll for information storage and transmission. The artificial immune system if developed properly could be used to prevent various connected components from being hacked, such as components in a vehicle or inter-connected gadgets. In the case where there is an anonmoly or an intrusion of any of the lesser components in the network, then greater components in the network could theoretically develop an immunity in realtime to contain the threat.


References


Cochran, T. O. (2015). Immunology Inspired Detection of Data Theft from Autonomous Network Activity.

Popov, S. (n.d.). The tangle. Retrieved November 24, 2015, from http://188.138.57.93/tangle.pdf 

Singh, A. (2015). Incorporation of Human Resistant System and Network Security System to improve Computer Security.


If you like this article, check out of my other posts
=====================================================

 - [Ciphertext Policy Attribute Based Encryption, Smart Contracts and Curiosume](https://steemit.com/crypto-news/@dana-edwards/ciphertext-policy-attribute-based-encryption-smart-contracts-and-curiosume)   
 - [Weird machines - unexpected behavior from unexpected (crafted) inputs](https://steemit.com/security/@dana-edwards/weird-machines-unexpected-behavior-from-unexpected-crafted-inputs)  
 - [Attack Tolerant Information Systems](https://steemit.com/tauchain/@dana-edwards/attack-tolerant-information-systems)  
 - [Abstract Interpretation and how to write secure software](https://steemit.com/security/@dana-edwards/abstract-interpretation-and-how-to-write-secure-software)  
 - [Enhanced information security through bioimicry?](https://steemit.com/security/@dana-edwards/enhanced-information-security-through-bioimicry) 
 - [Hardware trojans and the threat of covert channels in software.](https://steemit.com/security/@dana-edwards/hardware-trojans-and-the-threat-of-covert-channels-in-software)
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,