Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2020

30.01.2020

Human immune-based model for intrusion detection in mobile ad hoc networks

verfasst von: Maha Abdelhaq, Raed Alsaqour, Abeer Algarni, Maali Alabdulhafith, Mahmoud Alawi, Aqeel Taha, Baraa Sharef, Mustafa Tariq

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc network (MANET) is a collection of mobile, decentralized and self-organizing nodes that are used in special cases such as medical and military purposes. Securing mobile ad hoc network MANET is a crucial research issue. The properties of MANET impede the protection of the network’s environment against attacks. MANET as an open area of wireless mobile nodes allow external attackers to join the network easily and masquerade legitimate nodes. Therefore, the objective of this paper is to develop a distributed, self-organizing and hybrid intelligent model, called dendritic cell fuzzy algorithm (DCFA), for security routing in MANET. The DCFA model inspiring the detection functionality of dendritic cells (DCs) in human immune system (HIS) and the accurate decision-making functionality of fuzzy logic theory to detect network attacks in MANET. The DCFA model is developed and validated by detecting a flooding-based attack, namely, a resource consumption attack (RCA). QualNet v5.0.2 is used as a simulation environment to test the capability of DCFA in detecting RCA over MANET. The results show the capability of DCFA to perform the detection operation with high efficiency and effectiveness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A fresh enough route contains a sequence number greater than or equal to that in the RREQ packet.
 
2
The unit of energy is joule. Mjoule is millijoule, which is equal to 1 × 10−3 joule.
 
Literatur
1.
Zurück zum Zitat Janeway CA, Travers P, Walport M, and Capra JD (2005) Immunobiology: the immune system in health and disease, 6 ed. vol. 1: Garland Science Publishing, New York Janeway CA, Travers P, Walport M, and Capra JD (2005) Immunobiology: the immune system in health and disease, 6 ed. vol. 1: Garland Science Publishing, New York
2.
Zurück zum Zitat de Castro LN, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Artificial Neural networks in Pattern Recognition 1:67–84 de Castro LN, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Artificial Neural networks in Pattern Recognition 1:67–84
3.
Zurück zum Zitat Costa Silva G, Caminhas WM, Palhares RM (2017) Artificial immune systems applied to fault detection and isolation. Appl Soft Comput 57:118–131CrossRef Costa Silva G, Caminhas WM, Palhares RM (2017) Artificial immune systems applied to fault detection and isolation. Appl Soft Comput 57:118–131CrossRef
4.
Zurück zum Zitat Yang J, Liu X, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowl-Based Syst 22:115–119CrossRef Yang J, Liu X, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowl-Based Syst 22:115–119CrossRef
5.
Zurück zum Zitat Sarafijanovic S, Le Boudec JY (2005) An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Trans Neural Netw 16(5):1076–1087CrossRef Sarafijanovic S, Le Boudec JY (2005) An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Trans Neural Netw 16(5):1076–1087CrossRef
6.
Zurück zum Zitat Fanelli R (2010) Further experimentation with hybrid immune inspired network intrusion detection. Presented at the international conference on artificial immune systems Fanelli R (2010) Further experimentation with hybrid immune inspired network intrusion detection. Presented at the international conference on artificial immune systems
7.
Zurück zum Zitat Zheng C, Sicker D (2013) A survey on biologically inspired algorithms for computer networking. IEEE Communications Surveys & Tutorials 15(3):1160–1191CrossRef Zheng C, Sicker D (2013) A survey on biologically inspired algorithms for computer networking. IEEE Communications Surveys & Tutorials 15(3):1160–1191CrossRef
8.
Zurück zum Zitat Kant L, Young K, Younis O, Shallcross D, Sinkar K, McAuley A et al (2008) Network science based approaches to design and analyze MANETs for military applications. IEEE Commun Mag 46(11):55–61CrossRef Kant L, Young K, Younis O, Shallcross D, Sinkar K, McAuley A et al (2008) Network science based approaches to design and analyze MANETs for military applications. IEEE Commun Mag 46(11):55–61CrossRef
9.
Zurück zum Zitat Alsaqour R, Abdelhaq M, Saeed R, Uddin M, Alsukour O, Al-Hubaishi M et al (2015) Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic. J Netw Comput Appl 47:32–46CrossRef Alsaqour R, Abdelhaq M, Saeed R, Uddin M, Alsukour O, Al-Hubaishi M et al (2015) Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic. J Netw Comput Appl 47:32–46CrossRef
10.
Zurück zum Zitat Hu X, Chu TH, Leung VC, Ngai EC-H, Kruchten P, Chan HC (2015) A survey on mobile social networks: applications, platforms, system architectures, and future research directions. IEEE Communications Surveys & Tutorials 17:1557–1581CrossRef Hu X, Chu TH, Leung VC, Ngai EC-H, Kruchten P, Chan HC (2015) A survey on mobile social networks: applications, platforms, system architectures, and future research directions. IEEE Communications Surveys & Tutorials 17:1557–1581CrossRef
11.
Zurück zum Zitat Yih-Chun H and Perrig A (2004) A survey of secure wireless ad hoc routing. Security & Privacy, IEEE, vol. 2, pp. 28–39 Yih-Chun H and Perrig A (2004) A survey of secure wireless ad hoc routing. Security & Privacy, IEEE, vol. 2, pp. 28–39
12.
Zurück zum Zitat Lima M, Dos Santos A, Pujolle G (2009) A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE 11:66–77CrossRef Lima M, Dos Santos A, Pujolle G (2009) A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE 11:66–77CrossRef
13.
Zurück zum Zitat Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal 54:1115–1126CrossRef Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal 54:1115–1126CrossRef
14.
Zurück zum Zitat Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100
16.
Zurück zum Zitat Pastrana S, Mitrokotsa A, Orfila A, Peris-Lopez P (2012) Evaluation of classification algorithms for intrusion detection in MANETs. Knowl-Based Syst 36:217–225CrossRef Pastrana S, Mitrokotsa A, Orfila A, Peris-Lopez P (2012) Evaluation of classification algorithms for intrusion detection in MANETs. Knowl-Based Syst 36:217–225CrossRef
17.
Zurück zum Zitat Mitchell R, Chen R (2014) A survey of intrusion detection in wireless network applications. Comput Commun 42:1–23CrossRef Mitchell R, Chen R (2014) A survey of intrusion detection in wireless network applications. Comput Commun 42:1–23CrossRef
18.
Zurück zum Zitat Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7:25CrossRef Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7:25CrossRef
19.
Zurück zum Zitat Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials 15:2027–2045CrossRef Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials 15:2027–2045CrossRef
20.
Zurück zum Zitat Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on, pp. 202–212 Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on, pp. 202–212
21.
Zurück zum Zitat Matzinger P (2002) The danger model: a renewed sense of self. Science 296:301–305CrossRef Matzinger P (2002) The danger model: a renewed sense of self. Science 296:301–305CrossRef
22.
Zurück zum Zitat Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Security and Communication Networks Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Security and Communication Networks
23.
Zurück zum Zitat Ou C-M (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86CrossRef Ou C-M (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86CrossRef
24.
Zurück zum Zitat Chelly Z, Elouedi Z (2010) FDCM: A fuzzy dendritic cell method. International Conference on Artificial Immune Systems:102–115 Chelly Z, Elouedi Z (2010) FDCM: A fuzzy dendritic cell method. International Conference on Artificial Immune Systems:102–115
25.
Zurück zum Zitat Chelly Z, Elouedi Z (2016) A survey of the dendritic cell algorithm. Knowl Inf Syst 48:505–535CrossRef Chelly Z, Elouedi Z (2016) A survey of the dendritic cell algorithm. Knowl Inf Syst 48:505–535CrossRef
26.
Zurück zum Zitat Fanelli RL (2010) Further experimentation with hybrid immune inspired network intrusion detection. International Conference on Artificial Immune Systems:264–275 Fanelli RL (2010) Further experimentation with hybrid immune inspired network intrusion detection. International Conference on Artificial Immune Systems:264–275
27.
Zurück zum Zitat Fanelli RL (2008) A hybrid model for immune inspired network intrusion detection. International Conference on Artificial Immune Systems:107–118 Fanelli RL (2008) A hybrid model for immune inspired network intrusion detection. International Conference on Artificial Immune Systems:107–118
28.
Zurück zum Zitat Wallenta C, Kim J, Bentley PJ, Hailes S (2010) Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. Appl Intell 32:1–26CrossRef Wallenta C, Kim J, Bentley PJ, Hailes S (2010) Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. Appl Intell 32:1–26CrossRef
29.
Zurück zum Zitat Drozda M, Schaust S, Szczerbicka H (2010) Immuno-inspired knowledge management for ad hoc wireless networks. Smart Information and Knowledge Management, ed: Springer, pp. 1–26 Drozda M, Schaust S, Szczerbicka H (2010) Immuno-inspired knowledge management for ad hoc wireless networks. Smart Information and Knowledge Management, ed: Springer, pp. 1–26
30.
Zurück zum Zitat Drozda M, Schaust S, Schildt S, Szczerbicka H (2009) An Error Propagation Algorithm for Ad Hoc Wireless Networks. International Conference on Artificial Immune Systems:260–273 Drozda M, Schaust S, Schildt S, Szczerbicka H (2009) An Error Propagation Algorithm for Ad Hoc Wireless Networks. International Conference on Artificial Immune Systems:260–273
31.
Zurück zum Zitat Greensmith J, Aickelin U, Tedesco G (2010) Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion 11:21–34CrossRef Greensmith J, Aickelin U, Tedesco G (2010) Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion 11:21–34CrossRef
32.
Zurück zum Zitat Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: The dendritic cell algorithm. Robust Intelligent Systems, ed: Springer, pp. 89–112 Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: The dendritic cell algorithm. Robust Intelligent Systems, ed: Springer, pp. 89–112
33.
Zurück zum Zitat Gu F, Greensmith J, Aicklein U (2012) The dendritic cell algorithm for intrusion detection. in Biologically Inspired Networking and Sensing: Algorithms and Architectures, ed: IGI Global, pp. 84–102 Gu F, Greensmith J, Aicklein U (2012) The dendritic cell algorithm for intrusion detection. in Biologically Inspired Networking and Sensing: Algorithms and Architectures, ed: IGI Global, pp. 84–102
34.
Zurück zum Zitat Kim J, Bentley PJ, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection–a review. Nat Comput 6:413–466MathSciNetCrossRef Kim J, Bentley PJ, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection–a review. Nat Comput 6:413–466MathSciNetCrossRef
35.
Zurück zum Zitat Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: The link between AIS and IDS? International Conference on Artificial Immune Systems:147–155 Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: The link between AIS and IDS? International Conference on Artificial Immune Systems:147–155
36.
Zurück zum Zitat McClure S, Scambray J, Kurtz G (2005) Hacking exposed: network security secrets & solutions. McGraw-Hill/Osborne, New York McClure S, Scambray J, Kurtz G (2005) Hacking exposed: network security secrets & solutions. McGraw-Hill/Osborne, New York
37.
Zurück zum Zitat Sarafijanovic S, Le Boudec J-Y (2005) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. Int J Unconv Comput 1:221–254 Sarafijanovic S, Le Boudec J-Y (2005) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. Int J Unconv Comput 1:221–254
38.
Zurück zum Zitat Janeway CA (1998) The road less traveled: the role of innate immunity in the adaptive immune response-presidential address to the American Association of Immunologists. J Immunol 161:539–544 Janeway CA (1998) The road less traveled: the role of innate immunity in the adaptive immune response-presidential address to the American Association of Immunologists. J Immunol 161:539–544
39.
Zurück zum Zitat Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10:1–35CrossRef Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10:1–35CrossRef
40.
Zurück zum Zitat Bretscher PA (1999) A two-step, two-signal model for the primary activation of precursor helper T cells. Proc Natl Acad Sci 96:185–190CrossRef Bretscher PA (1999) A two-step, two-signal model for the primary activation of precursor helper T cells. Proc Natl Acad Sci 96:185–190CrossRef
41.
Zurück zum Zitat e Sousa CR (2001) Dendritic cells as sensors of infection. Immunity 14:495–498CrossRef e Sousa CR (2001) Dendritic cells as sensors of infection. Immunity 14:495–498CrossRef
42.
Zurück zum Zitat Oshashi PS, De Franco AL (2002) Making and breaking tolerance. Curr Opin Immunol 14:744–759CrossRef Oshashi PS, De Franco AL (2002) Making and breaking tolerance. Curr Opin Immunol 14:744–759CrossRef
43.
Zurück zum Zitat Motran CC, Ambrosio LF, Volpini X, Celias DP, Cervi L (2017) Dendritic cells and parasites: from recognition and activation to immune response instruction. Semin Immunopathol:199–213 Motran CC, Ambrosio LF, Volpini X, Celias DP, Cervi L (2017) Dendritic cells and parasites: from recognition and activation to immune response instruction. Semin Immunopathol:199–213
45.
Zurück zum Zitat Yan J, Ryan M, Power J (1995) Using fuzzy logic: towards intelligent systems. Prentice-Hall, Inc., Upper Saddle River Yan J, Ryan M, Power J (1995) Using fuzzy logic: towards intelligent systems. Prentice-Hall, Inc., Upper Saddle River
46.
Zurück zum Zitat Cui S, Goldsmith AJ, Bahai A (2005) Energy-constrained modulation optimization. IEEE Transactions on Wireless Communications 4:2349–2360CrossRef Cui S, Goldsmith AJ, Bahai A (2005) Energy-constrained modulation optimization. IEEE Transactions on Wireless Communications 4:2349–2360CrossRef
47.
Zurück zum Zitat Feeney LM, Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1548–1557 Feeney LM, Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1548–1557
49.
Zurück zum Zitat Forkel I, Schinnenburg M, Wouters B (2003) Performance evaluation of soft handover in a realistic UMTS network. In The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring., pp. 1979-1983 Forkel I, Schinnenburg M, Wouters B (2003) Performance evaluation of soft handover in a realistic UMTS network. In The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring., pp. 1979-1983
50.
Zurück zum Zitat Khalil I, Bagchi S, Shroff NB (2005) LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. in Dependable Systems and Networks, 2005. DSN 2005. Proceedings International Conference on, pp. 612–621 Khalil I, Bagchi S, Shroff NB (2005) LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. in Dependable Systems and Networks, 2005. DSN 2005. Proceedings International Conference on, pp. 612–621
51.
Zurück zum Zitat Ou C-M, Ou C, Wang Y-T (2013) Agent-Based Artificial Immune Systems (ABAIS) for intrusion detections: inspiration from danger theory. in Agent and Multi-Agent Systems in Distributed Systems-Digital Economy and E-Commerce, ed: Springer, pp. 67–94 Ou C-M, Ou C, Wang Y-T (2013) Agent-Based Artificial Immune Systems (ABAIS) for intrusion detections: inspiration from danger theory. in Agent and Multi-Agent Systems in Distributed Systems-Digital Economy and E-Commerce, ed: Springer, pp. 67–94
Metadaten
Titel
Human immune-based model for intrusion detection in mobile ad hoc networks
verfasst von
Maha Abdelhaq
Raed Alsaqour
Abeer Algarni
Maali Alabdulhafith
Mahmoud Alawi
Aqeel Taha
Baraa Sharef
Mustafa Tariq
Publikationsdatum
30.01.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00862-9

Weitere Artikel der Ausgabe 3/2020

Peer-to-Peer Networking and Applications 3/2020 Zur Ausgabe