oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm
Maha Abdelhaq,Rosilah Hassan,Mahamod Ismail,Daud Israf
Research Journal of Applied Sciences, Engineering and Technology , 2011,
Abstract: The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs’ properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this paper proposes a DCIIDA architecture which should be applied by each node in MANET.
Next Challenges in Bringing Artificial Immune Systems to Production in Network Security  [PDF]
Michael Hilker
Computer Science , 2008,
Abstract: The human immune system protects the human body against various pathogens like e.g. biological viruses and bacteria. Artificial immune systems reuse the architecture, organization, and workflows of the human immune system for various problems in computer science. In the network security, the artificial immune system is used to secure a network and its nodes against intrusions like viruses, worms, and trojans. However, these approaches are far away from production where they are academic proof-of-concept implementations or use only a small part to protect against a certain intrusion. This article discusses the required steps to bring artificial immune systems into production in the network security domain. It furthermore figures out the challenges and provides the description and results of the prototype of an artificial immune system, which is SANA called.
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems  [PDF]
Michael Hilker,Christoph Schommer
Computer Science , 2008,
Abstract: The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an artificial Immune System with artificial Cells which perform certain Tasks in order to to support existing systems to better secure the Network against Intrusions. The Advantages of SANA are that it is efficient, adaptive, autonomous, and massively-distributed. In this Article, we describe the Architecture of the artificial Immune System and the Functionality of the Components. We explain briefly the Implementation and discuss Results.
New Artificial Immune Algorithm for Storage Security
面向存储安全系统的新型人工免疫算法

CA Tao,JU Shi-guang,ZHONG Wei,NIU De-jiao,
蔡涛
,鞠时光,仲巍,牛德姣

计算机科学 , 2008,
Abstract: On the basis of analyzing demand of storage security system and current artificial immune algorithm,this paper presents new artificial immune algorithm to ensure security of storage system efficiently.Main current matching rules are introduced to analyze the efficiency of current artificial immune algorithm.Firstly the structure of storage security system and the definition of main elements in it are given.To improve the efficiency of artificial immune algorithm,this paper proposes random r-continuous match...
Artificial Immune Danger Theory Based Model for Network Security Evaluation  [cached]
Feixian Sun
Journal of Networks , 2011, DOI: 10.4304/jnw.6.2.255-262
Abstract: Inspired by the principles of immune danger theory, a danger theory based model for network security risk assessment is presented in this paper. Firstly, the principle of the danger theory is introduced. And then, with the improved concepts and formal definitions of antigen, antibody, danger signal, and detection lymphocyte for network security risk assessment presented, the distributed architecture of the proposed model is described. Following that, the principle of network intrusion detection is expounded. Finally, the method of network security risk assessment is given. Theoretical analysis and simulation results show that the proposed model can evaluate the network attack threats in real time. Thus, it provides an effective risk evaluation solution to network security.
Review of Artificial Immune System to Enhance Security in Mobile Ad-hoc Networks  [PDF]
Tarun Dalal,Gopal Singh
International Journal of Computer Science and Management Studies , 2012,
Abstract: Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not fixed in a Mobile Adhoc Network; due to host mobility topology can change any time. Mobile Ad-hoc Networks are much more vulnerable to security attacks. Current research works on securing Mobile Adhoc Networks mainly focus on confidentiality, integrity,authentication, availability, and fairness. Design of routingprotocols is very much crucial in Mobile Ad-hoc Network. There are various techniques for securing Mobile Ad-hoc Network i.e. cryptography. Cryptography provides efficient mechanism to provide security, but it creates very much overhead. So, an approach is used which is analogous to Biological Immune System, known as Artificial Immune System (AIS). There is a reason of AIS to be used for security purposes because the Human Immune System (HIS) protects the body against damage from an extremely large number of harmfulbacteria, viruses, parasites and fungi, termed pathogens. It doesthis largely without prior knowledge of the structure of thesepathogens. AIS provide security by determining non-trusted nodes and eliminate all non-trusted nodes from the network.
A Method in Security of Wireless Sensor Network based on Optimized Artificial immune system in Multi-Agent Environments  [PDF]
Jaderian Morteza,Moradzadeh Hossein,Madadipouya Kasra,Firoozinia Mohammad,Shamshirband Shahaboddin
Computer Science , 2015,
Abstract: Security in computer networks is one of the most interesting aspects of computer systems. It is typically represented by the initials CIA: confidentiality, integrity, and authentication or availability. Although, many access levels for data protection have been identified in computer networks, the intruders would still find lots of ways to harm sites and systems. The accommodation proceedings and the security supervision in the network systems, especially wireless sensor networks have been changed into a challenging point. One of the newest security algorithms for wireless sensor networks is Artificial Immune System (AIS) algorithm. Human lymphocytes play the main role in recognizing and destroying the unknown elements. In this article, we focus on the inspiration of these defective systems to guarantee the complications security using two algorithms; the first algorithms proposed to distinguish self-nodes from non-self ones by the related factors and the second one is to eliminate the enemy node danger.The results showed a high rate success and good rate of detecting for unknown object; it could present the best nodes with high affinity and fitness to be selected to confront the unknown agents.
Research on routing security in MANET
MANET路由安全研究*

LUO Jun-hai,FAN Ming-yu,YE Dan-xia,
罗俊海
,范明钰,叶丹霞c

计算机应用研究 , 2008,
Abstract: This paper studied the routing security issues of MANET and analyzed one type of attack the black hole problem that could easily be employed against the MANET in detail. Then, proposed a strategy for the black hole problem for routing security in MANET.
Analysis of MANET Security, Architecture and Assessment
Sweta Kaushik,Manorma Kaushik
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: in these days, the Mobile ad hoc network (MANET) technology spreads widely. Architecture and security issue is the most sensitive challenge of MANET. MANET support to nodes for directly communications with all the other nodes within their radio ranges through multiple wireless links, where the nodes are not in the direct communication range using intermediate node(s) to communicate with each other. In a MANET, the users’ mobile devices behave as a network, and they must cooperatively provide the different functions which are generally provided by the network infrastructure like as routers, switches, servers. The security issues and requirement of the MANET depends on its application. Specific security architecture is necessary for specific application. The security challenges in the MANET generate because of its dynamic topology, vulnerable wireless link and nomadic environment. In this paper we have discussed the architecture and security issues of MANET.
Integration of modified Security Service Vector to the MANET
Anton ?i?már,?ubomír Dobo?,Ján Papaj
Journal of Electrical and Electronics Engineering , 2009,
Abstract: A mobile ad-hoc network (MANET) isinfrastructure-less, self-organized networks that eitheroperate autonomously or as an extension to the wirednetworking infrastructure. MANET is expected tosupport new QoS and security-based applications andnew services. Nowadays, the QoS and security are veryimportant areas of research in MANET, but areconsider separately with different objectives andarchitectures. No protocols or systems are designed tointegration QoS and security to the integrated compactsystem in MANET. We design new complex user-basedmodel to interaction between User, QoS, Security andDynamic Source Routing protocol (DSR) via SecurityService Vector (SSV). The main challenge is providethe ability to configure own level of QoS and security,and provides user’s new abilities of configuringrequirements to QoS and security. This paperexamines the integration of modified SSV to theMANET. The DSR is modified to implement SSV. Weshow and simulate basic principle and operations ofthis process.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.