Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm

The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs' properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper's objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this study proposes a DCIIDA architecture which should be applied by each node in MANET.

[1]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[2]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[3]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[4]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[5]  Helena Szczerbicka,et al.  Immuno-inspired Knowledge Management for Ad Hoc Wireless Networks , 2010, Smart Information and Knowledge Management.

[6]  Julie Greensmith,et al.  The dendritic cell algorithm , 2007 .

[7]  Uwe Aickelin,et al.  Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.

[8]  Peter J. Bentley,et al.  Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.

[9]  Sunil Taneja,et al.  A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .

[10]  Jean-Yves Le Boudec,et al.  An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks , 2005, IEEE Transactions on Neural Networks.

[11]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[12]  Gu Ji-yan,et al.  The Dendritic Cell Algorithm , 2011 .

[13]  Mingzeng Hu,et al.  A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[14]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Robert L. Fanelli Further Experimentation with Hybrid Immune Inspired Network Intrusion Detection , 2010, ICARIS.

[16]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[17]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.

[18]  Julie Greensmith,et al.  Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.