Human immune-based model for intrusion detection in mobile ad hoc networks

被引:4
|
作者
Abdelhaq, Maha [1 ,2 ]
Alsaqour, Raed [3 ]
Algarni, Abeer [1 ]
Alabdulhafith, Maali [1 ]
Alawi, Mahmoud [4 ]
Taha, Aqeel [5 ]
Sharef, Baraa [6 ]
Tariq, Mustafa [2 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 84428, Saudi Arabia
[2] Natl Univ Malaysia, Fac Informat Sci & Technol, Res Ctr Software Technol & Management, Bangi 43600, Selangor, Malaysia
[3] Saudi Elect Univ, Coll Comp & Informat, Dept Informat Technol, Riyadh 93499, Saudi Arabia
[4] Zanzibar Univ, Fac Engn, Dept Comp Engn & IT, Zanzibar, Tanzania
[5] NSA, Dept Informat Technol, Baghdad, Iraq
[6] Ahlia Univ, Fac Informat Technol, Dept Informat Technol, Manama, Bahrain
关键词
Mobile ad hoc network; Artificial immune system; Danger theory; Dendritic cells; Fuzzy logic theory; PERFORMANCE EVALUATION; DENDRITIC CELLS; ALGORITHMS; ACTIVATION;
D O I
10.1007/s12083-019-00862-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc network (MANET) is a collection of mobile, decentralized and self-organizing nodes that are used in special cases such as medical and military purposes. Securing mobile ad hoc network MANET is a crucial research issue. The properties of MANET impede the protection of the network's environment against attacks. MANET as an open area of wireless mobile nodes allow external attackers to join the network easily and masquerade legitimate nodes. Therefore, the objective of this paper is to develop a distributed, self-organizing and hybrid intelligent model, called dendritic cell fuzzy algorithm (DCFA), for security routing in MANET. The DCFA model inspiring the detection functionality of dendritic cells (DCs) in human immune system (HIS) and the accurate decision-making functionality of fuzzy logic theory to detect network attacks in MANET. The DCFA model is developed and validated by detecting a flooding-based attack, namely, a resource consumption attack (RCA). QualNet v5.0.2 is used as a simulation environment to test the capability of DCFA in detecting RCA over MANET. The results show the capability of DCFA to perform the detection operation with high efficiency and effectiveness.
引用
收藏
页码:1046 / 1068
页数:23
相关论文
共 50 条
  • [1] Human immune-based model for intrusion detection in mobile ad hoc networks
    Maha Abdelhaq
    Raed Alsaqour
    Abeer Algarni
    Maali Alabdulhafith
    Mahmoud Alawi
    Aqeel Taha
    Baraa Sharef
    Mustafa Tariq
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1046 - 1068
  • [2] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    [J]. MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [3] Host based intrusion detection architecture for mobile ad hoc networks
    Ray, Prabhudutta
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1942 - 1946
  • [4] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [5] Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation
    Lin, T.
    Wu, P.
    Gao, F. M.
    Wu, T. S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2019, 14 (05) : 660 - 671
  • [6] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [7] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [8] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping
    Jiang Xinghao
    Wu Yue
    Liu Ning
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 851 - 859
  • [9] Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
    Cretu, Gabriela F.
    Parekh, Janak J.
    Wang, Ke
    Stolfo, Salvatore J.
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 635 - 639
  • [10] Mobile agents-based intrusion detection system for mobile ad hoc networks
    Li, Yinan
    Qian, Zhihong
    [J]. 2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 145 - 148