Detecting resource consumption attack over MANET using an artificial immune algorithm
The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based al...
| Main Authors: | Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Maxwell Scientific Organization
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/24685/ http://psasir.upm.edu.my/id/eprint/24685/1/Detecting%20resource%20consumption%20attack%20over%20MANET%20using%20an%20artificial%20immune%20algorithm.pdf |
Similar Items
A review on wormhole attacks in MANET
by: Enshaei, Mehdi, et al.
Published: (2015)
by: Enshaei, Mehdi, et al.
Published: (2015)
Effective black hole attacks in MANETs
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
Artificial Immune Algorithms For University Examination Timetabling.
by: Malim, Muhammad Rozi, et al.
Published: (2005)
by: Malim, Muhammad Rozi, et al.
Published: (2005)
Adapting Artificial Immune Algorithms For University Timetabling
by: Malim , Muhammad Rozi
Published: (2009)
by: Malim , Muhammad Rozi
Published: (2009)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
A Distributed Resource-Management Approach in MANETs
by: B., Pahlevanzadeh, et al.
Published: (2008)
by: B., Pahlevanzadeh, et al.
Published: (2008)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
A hybrid algorithm for improving the quality of service in MANET
by: Hassan, Mustafa Hamid, et al.
Published: (2018)
by: Hassan, Mustafa Hamid, et al.
Published: (2018)
ARTIFICIAL IMMUNE ALGORITHM BASED GRAVIMETRIC FLUID DISPENSING MACHINE
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
Performance evaluation of energy consumption for AODV and DSR routing protocols in MANET
by: Barati, Mehdi, et al.
Published: (2012)
by: Barati, Mehdi, et al.
Published: (2012)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014)
by: Chan, King-Sun, et al.
Published: (2014)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
by: Hormozi, Shahram Golzari
Published: (2011)
by: Hormozi, Shahram Golzari
Published: (2011)
A Hellinger Distance Based Algorithm To Detect Distributed Denial Of Service Attacks On Voice Over Internet Protocol Environments
by: ., Narayanan Sambath
Published: (2017)
by: ., Narayanan Sambath
Published: (2017)
MANET routing protocols
by: Alawi, Mahmoud, et al.
Published: (2011)
by: Alawi, Mahmoud, et al.
Published: (2011)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Performance evaluation of AODV ,OLSR, and GRP for
transmitting video conferencing over MANETs
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
Artificial Immune System Based Data Miner
by: Hassan Babiker, Amir Samir
Published: (2011)
by: Hassan Babiker, Amir Samir
Published: (2011)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Testbed on MANET (ToM): private testbed
facility for MANET Experiment
by: Muchtar, Farkhana, et al.
Published: (2019)
by: Muchtar, Farkhana, et al.
Published: (2019)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Enhanced Hopfield Neural Networks With Artificial Immune System Algorithm For Satisfiability Logic Programming
by: Mansor, Mohd. Asyraf
Published: (2017)
by: Mansor, Mohd. Asyraf
Published: (2017)
Similar Items
-
A review on wormhole attacks in MANET
by: Enshaei, Mehdi, et al.
Published: (2015) -
Effective black hole attacks in MANETs
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013) -
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008) -
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al. -
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)