Detecting resource consumption attack over MANET using an artificial immune algorithm

The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based al...

Full description

Bibliographic Details
Main Authors: Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad
Format: Article
Language:English
Published: Maxwell Scientific Organization 2011
Online Access:http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf
_version_ 1825925622090694656
author Abdelhaq, Maha
Hassan, Rosilah
Ismail, Mahamod
Israf Ali, Daud Ahmad
author_facet Abdelhaq, Maha
Hassan, Rosilah
Ismail, Mahamod
Israf Ali, Daud Ahmad
author_sort Abdelhaq, Maha
collection UPM
description The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs’ properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this paper proposes a DCIIDA architecture which should be applied by each node in MANET.
first_indexed 2024-03-06T08:00:35Z
format Article
id upm.eprints-24685
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T08:00:35Z
publishDate 2011
publisher Maxwell Scientific Organization
record_format dspace
spelling upm.eprints-246852019-10-24T08:07:41Z http://psasir.upm.edu.my/id/eprint/24685/ Detecting resource consumption attack over MANET using an artificial immune algorithm Abdelhaq, Maha Hassan, Rosilah Ismail, Mahamod Israf Ali, Daud Ahmad The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs’ properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this paper proposes a DCIIDA architecture which should be applied by each node in MANET. Maxwell Scientific Organization 2011 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf Abdelhaq, Maha and Hassan, Rosilah and Ismail, Mahamod and Israf Ali, Daud Ahmad (2011) Detecting resource consumption attack over MANET using an artificial immune algorithm. Research Journal of Applied Sciences, Engineering and Technology, 3 (9). pp. 1026-1033. ISSN 2040-7459; ESSN: 2040-7467 https://maxwellsci.com/jp/abstract.php?jid=RJASET&no=137&abs=28
spellingShingle Abdelhaq, Maha
Hassan, Rosilah
Ismail, Mahamod
Israf Ali, Daud Ahmad
Detecting resource consumption attack over MANET using an artificial immune algorithm
title Detecting resource consumption attack over MANET using an artificial immune algorithm
title_full Detecting resource consumption attack over MANET using an artificial immune algorithm
title_fullStr Detecting resource consumption attack over MANET using an artificial immune algorithm
title_full_unstemmed Detecting resource consumption attack over MANET using an artificial immune algorithm
title_short Detecting resource consumption attack over MANET using an artificial immune algorithm
title_sort detecting resource consumption attack over manet using an artificial immune algorithm
url http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf
work_keys_str_mv AT abdelhaqmaha detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm
AT hassanrosilah detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm
AT ismailmahamod detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm
AT israfalidaudahmad detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm