Detecting resource consumption attack over MANET using an artificial immune algorithm
The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based al...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Maxwell Scientific Organization
2011
|
Online Access: | http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf |
_version_ | 1825925622090694656 |
---|---|
author | Abdelhaq, Maha Hassan, Rosilah Ismail, Mahamod Israf Ali, Daud Ahmad |
author_facet | Abdelhaq, Maha Hassan, Rosilah Ismail, Mahamod Israf Ali, Daud Ahmad |
author_sort | Abdelhaq, Maha |
collection | UPM |
description | The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs’ properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this paper proposes a DCIIDA architecture which should be applied by each node in MANET. |
first_indexed | 2024-03-06T08:00:35Z |
format | Article |
id | upm.eprints-24685 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T08:00:35Z |
publishDate | 2011 |
publisher | Maxwell Scientific Organization |
record_format | dspace |
spelling | upm.eprints-246852019-10-24T08:07:41Z http://psasir.upm.edu.my/id/eprint/24685/ Detecting resource consumption attack over MANET using an artificial immune algorithm Abdelhaq, Maha Hassan, Rosilah Ismail, Mahamod Israf Ali, Daud Ahmad The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs’ properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this paper proposes a DCIIDA architecture which should be applied by each node in MANET. Maxwell Scientific Organization 2011 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf Abdelhaq, Maha and Hassan, Rosilah and Ismail, Mahamod and Israf Ali, Daud Ahmad (2011) Detecting resource consumption attack over MANET using an artificial immune algorithm. Research Journal of Applied Sciences, Engineering and Technology, 3 (9). pp. 1026-1033. ISSN 2040-7459; ESSN: 2040-7467 https://maxwellsci.com/jp/abstract.php?jid=RJASET&no=137&abs=28 |
spellingShingle | Abdelhaq, Maha Hassan, Rosilah Ismail, Mahamod Israf Ali, Daud Ahmad Detecting resource consumption attack over MANET using an artificial immune algorithm |
title | Detecting resource consumption attack over MANET using an artificial immune algorithm |
title_full | Detecting resource consumption attack over MANET using an artificial immune algorithm |
title_fullStr | Detecting resource consumption attack over MANET using an artificial immune algorithm |
title_full_unstemmed | Detecting resource consumption attack over MANET using an artificial immune algorithm |
title_short | Detecting resource consumption attack over MANET using an artificial immune algorithm |
title_sort | detecting resource consumption attack over manet using an artificial immune algorithm |
url | http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf |
work_keys_str_mv | AT abdelhaqmaha detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm AT hassanrosilah detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm AT ismailmahamod detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm AT israfalidaudahmad detectingresourceconsumptionattackovermanetusinganartificialimmunealgorithm |