Using dendritic cell algorithm to detect the resource consumption attack over MANET

Maha Abdelhaq, Rosilah Hassan, Raed Alsaqour

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and network based systems, whilst MANET is defined as a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AIS properties as robust, self-healing, and self-organizing system can meet the challenges of securing MANET environment. This paper objective is to utilize the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to detect a type of Denial of Service (DoS) attack called Resource Consumption Attack (RCA) and also called sleep deprivation attack over MANET. The paper introduces a Mobile Dendritic Cell Algorithm (MDCA) architecture in which DCA plugged to be applied by each MANET node.

Original languageEnglish
Title of host publicationCommunications in Computer and Information Science
Pages429-442
Number of pages14
Volume181 CCIS
EditionPART 3
DOIs
Publication statusPublished - 2011
Event2nd International Conference on Software Engineering and Computer Systems, ICSECS 2011 - Kuantan
Duration: 27 Jun 201129 Jun 2011

Publication series

NameCommunications in Computer and Information Science
NumberPART 3
Volume181 CCIS
ISSN (Print)18650929

Other

Other2nd International Conference on Software Engineering and Computer Systems, ICSECS 2011
CityKuantan
Period27/6/1129/6/11

Fingerprint

Mobile ad hoc networks
Immune system
Intrusion detection
Dendritic Cells

Keywords

  • Artificial Immune System
  • Danger Theory
  • Dendritic Cell Algorithm
  • Denial of Service attack
  • Mobile Ad Hoc Networks
  • Resource Consumption Attack

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Abdelhaq, M., Hassan, R., & Alsaqour, R. (2011). Using dendritic cell algorithm to detect the resource consumption attack over MANET. In Communications in Computer and Information Science (PART 3 ed., Vol. 181 CCIS, pp. 429-442). (Communications in Computer and Information Science; Vol. 181 CCIS, No. PART 3). https://doi.org/10.1007/978-3-642-22203-0_38

Using dendritic cell algorithm to detect the resource consumption attack over MANET. / Abdelhaq, Maha; Hassan, Rosilah; Alsaqour, Raed.

Communications in Computer and Information Science. Vol. 181 CCIS PART 3. ed. 2011. p. 429-442 (Communications in Computer and Information Science; Vol. 181 CCIS, No. PART 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abdelhaq, M, Hassan, R & Alsaqour, R 2011, Using dendritic cell algorithm to detect the resource consumption attack over MANET. in Communications in Computer and Information Science. PART 3 edn, vol. 181 CCIS, Communications in Computer and Information Science, no. PART 3, vol. 181 CCIS, pp. 429-442, 2nd International Conference on Software Engineering and Computer Systems, ICSECS 2011, Kuantan, 27/6/11. https://doi.org/10.1007/978-3-642-22203-0_38
Abdelhaq M, Hassan R, Alsaqour R. Using dendritic cell algorithm to detect the resource consumption attack over MANET. In Communications in Computer and Information Science. PART 3 ed. Vol. 181 CCIS. 2011. p. 429-442. (Communications in Computer and Information Science; PART 3). https://doi.org/10.1007/978-3-642-22203-0_38
Abdelhaq, Maha ; Hassan, Rosilah ; Alsaqour, Raed. / Using dendritic cell algorithm to detect the resource consumption attack over MANET. Communications in Computer and Information Science. Vol. 181 CCIS PART 3. ed. 2011. pp. 429-442 (Communications in Computer and Information Science; PART 3).
@inproceedings{b57de0c29f2d42b3ae8a158b654426b9,
title = "Using dendritic cell algorithm to detect the resource consumption attack over MANET",
abstract = "Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and network based systems, whilst MANET is defined as a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AIS properties as robust, self-healing, and self-organizing system can meet the challenges of securing MANET environment. This paper objective is to utilize the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to detect a type of Denial of Service (DoS) attack called Resource Consumption Attack (RCA) and also called sleep deprivation attack over MANET. The paper introduces a Mobile Dendritic Cell Algorithm (MDCA) architecture in which DCA plugged to be applied by each MANET node.",
keywords = "Artificial Immune System, Danger Theory, Dendritic Cell Algorithm, Denial of Service attack, Mobile Ad Hoc Networks, Resource Consumption Attack",
author = "Maha Abdelhaq and Rosilah Hassan and Raed Alsaqour",
year = "2011",
doi = "10.1007/978-3-642-22203-0_38",
language = "English",
isbn = "9783642222023",
volume = "181 CCIS",
series = "Communications in Computer and Information Science",
number = "PART 3",
pages = "429--442",
booktitle = "Communications in Computer and Information Science",
edition = "PART 3",

}

TY - GEN

T1 - Using dendritic cell algorithm to detect the resource consumption attack over MANET

AU - Abdelhaq, Maha

AU - Hassan, Rosilah

AU - Alsaqour, Raed

PY - 2011

Y1 - 2011

N2 - Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and network based systems, whilst MANET is defined as a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AIS properties as robust, self-healing, and self-organizing system can meet the challenges of securing MANET environment. This paper objective is to utilize the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to detect a type of Denial of Service (DoS) attack called Resource Consumption Attack (RCA) and also called sleep deprivation attack over MANET. The paper introduces a Mobile Dendritic Cell Algorithm (MDCA) architecture in which DCA plugged to be applied by each MANET node.

AB - Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and network based systems, whilst MANET is defined as a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AIS properties as robust, self-healing, and self-organizing system can meet the challenges of securing MANET environment. This paper objective is to utilize the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to detect a type of Denial of Service (DoS) attack called Resource Consumption Attack (RCA) and also called sleep deprivation attack over MANET. The paper introduces a Mobile Dendritic Cell Algorithm (MDCA) architecture in which DCA plugged to be applied by each MANET node.

KW - Artificial Immune System

KW - Danger Theory

KW - Dendritic Cell Algorithm

KW - Denial of Service attack

KW - Mobile Ad Hoc Networks

KW - Resource Consumption Attack

UR - http://www.scopus.com/inward/record.url?scp=79960361258&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79960361258&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-22203-0_38

DO - 10.1007/978-3-642-22203-0_38

M3 - Conference contribution

SN - 9783642222023

VL - 181 CCIS

T3 - Communications in Computer and Information Science

SP - 429

EP - 442

BT - Communications in Computer and Information Science

ER -