Abstract
Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and network based systems, whilst MANET is defined as a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AIS properties as robust, self-healing, and self-organizing system can meet the challenges of securing MANET environment. This paper objective is to utilize the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to detect a type of Denial of Service (DoS) attack called Resource Consumption Attack (RCA) and also called sleep deprivation attack over MANET. The paper introduces a Mobile Dendritic Cell Algorithm (MDCA) architecture in which DCA plugged to be applied by each MANET node.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Matzinger, P.: Tolerance, Danger, and the Extended Family. Annual Review of Immunology 12, 991–1045 (1994)
Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)
Greensmith, J., Aickelin, U., Tedesco, G.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Information Fusion 11, 21–34 (2010)
Kim, J., Bentley, P.J., Wallenta, C., Ahmed, M., Hailes, S.: Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol. 4163, pp. 390–403. Springer, Heidelberg (2006)
Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, United Kingdom (2009)
Twycross, J., Aickelin, U.: Towards a Conceptual Framework for Innate Immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 112–125. Springer, Heidelberg (2005)
Sarafijanovic, S., Le Boudec, J.Y.: An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 342–356. Springer, Heidelberg (2004)
Sarafijanovic, S., Le Boudec, J.Y.: An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Transactions on Neural Networks 16(5), 1076–1087 (2005)
Twycross, J., Aickelin, U.: Libtissue - Implementing Innate Immunity. In: IEEE Congress on Evolutionary Computation (CEC 2006), pp. 499–506. IEEE Press, New York (2006)
Fanelli, R.: Further experimentation with hybrid immune inspired network intrusion detection. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol. 6209, pp. 264–275. Springer, Heidelberg (2010)
Drozda, M., Schaust, S., Szczerbicka, H.: Immuno-inspired Knowledge Management for Ad Hoc Wireless Networks. In: Szczerbicki, E., Nguyen, N.T. (eds.), pp. 1–26. Springer, Heidelberg (2010)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of International Conference on Mobile Computing and Networking, pp. 255–265 (2005)
Wang, D., Hu, M., Zhi, H.: A survey of Secure Routing in Ad Hoc Networks. In: 9th IEEE International Conference on Web Age Information Management, pp. 482–486. IEEE Press, Zhangjiajie Hunan (2008)
Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (1999)
Taneja, S., Kush, A.: A Survey of routing protocols in mobile ad hoc networks. international journal of innovation management and technology 1, 279–285 (2010)
Nadeem, A., Howarth, M.: Adaptive Intrusion Detection & Prevention of Denial of Service Attacks in MANETs. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 926–930. ACM, New York (2009)
United States Government. NIAIDS. Understanding the Immune System, How It Works. NIH Publication No. 03-5423. U.S. National Institutes of Health (2003)
University of Tokyo, Japan, http://www.mcl.iis.u-tokyo.ac.jp/eng_version/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abdelhaq, M., Hassan, R., Alsaqour, R. (2011). Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET. In: Zain, J.M., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 181. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22203-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-22203-0_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22202-3
Online ISBN: 978-3-642-22203-0
eBook Packages: Computer ScienceComputer Science (R0)