Detecting resource consumption attack over MANET using an artificial immune algorithm

Maha Abdelhaq, Rosilah Hassan, Mahamod Ismail, Daud Israf

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs' properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper's objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this study proposes a DCIIDA architecture which should be applied by each node in MANET.

Original languageEnglish
Pages (from-to)1026-1033
Number of pages8
JournalResearch Journal of Applied Sciences, Engineering and Technology
Volume3
Issue number9
Publication statusPublished - 2011

Fingerprint

Mobile ad hoc networks
Intrusion detection
Immune system
Dendritic Cells

Keywords

  • Artificial immune system
  • Attack
  • Dendritic cell algorithm
  • Denial of service attack
  • Mobile ad hoc networks
  • Resource consumption danger theory

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science(all)

Cite this

Detecting resource consumption attack over MANET using an artificial immune algorithm. / Abdelhaq, Maha; Hassan, Rosilah; Ismail, Mahamod; Israf, Daud.

In: Research Journal of Applied Sciences, Engineering and Technology, Vol. 3, No. 9, 2011, p. 1026-1033.

Research output: Contribution to journalArticle

@article{67976a1633c54428b6989adc39560966,
title = "Detecting resource consumption attack over MANET using an artificial immune algorithm",
abstract = "The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs' properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper's objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this study proposes a DCIIDA architecture which should be applied by each node in MANET.",
keywords = "Artificial immune system, Attack, Dendritic cell algorithm, Denial of service attack, Mobile ad hoc networks, Resource consumption danger theory",
author = "Maha Abdelhaq and Rosilah Hassan and Mahamod Ismail and Daud Israf",
year = "2011",
language = "English",
volume = "3",
pages = "1026--1033",
journal = "Research Journal of Applied Sciences, Engineering and Technology",
issn = "2040-7459",
publisher = "Maxwell Scientific Publications",
number = "9",

}

TY - JOUR

T1 - Detecting resource consumption attack over MANET using an artificial immune algorithm

AU - Abdelhaq, Maha

AU - Hassan, Rosilah

AU - Ismail, Mahamod

AU - Israf, Daud

PY - 2011

Y1 - 2011

N2 - The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs' properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper's objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this study proposes a DCIIDA architecture which should be applied by each node in MANET.

AB - The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs' properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper's objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this study proposes a DCIIDA architecture which should be applied by each node in MANET.

KW - Artificial immune system

KW - Attack

KW - Dendritic cell algorithm

KW - Denial of service attack

KW - Mobile ad hoc networks

KW - Resource consumption danger theory

UR - http://www.scopus.com/inward/record.url?scp=82555163343&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=82555163343&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:82555163343

VL - 3

SP - 1026

EP - 1033

JO - Research Journal of Applied Sciences, Engineering and Technology

JF - Research Journal of Applied Sciences, Engineering and Technology

SN - 2040-7459

IS - 9

ER -