IJCNIS Vol. 6, No. 10, 8 Sep. 2014
Cover page and Table of Contents: PDF (size: 488KB)
Full Text (PDF, 488KB), PP.32-39
Views: 0 Downloads: 0
MANET, Threshold, Intrusion Detection System, Behavioral Pattern, DTQ function
Mobile Ad hoc NETworks (MANETs) are the new generation of networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to their open nature and lack of infrastructure, security for MANETS has become an intricate problem than the security in other networks. The conventional security mechanisms of protecting a wired network are not sufficient for these networks. Hence a second level of defense to detect and respond to the security problem called an Intrusion detection system is required. Generally the malicious nodes demonstrate a different behavioral pattern of all the other normal nodes. So an Intrusion Detection System based on anomaly based intrusion detection that works by checking the behavior of the nodes was proposed. Here, in this paper to determine the behavior of the nodes as malicious or legitimate a Data Transmission Quality (DTQ) function is used. The DTQ function is defined in such a way that it will be close to a constant or keep changing smoothly for genuine nodes and will keep on diminishing for malicious nodes.. The final decision of confirming nodes as malicious is determined by a group consensus method. The evaluation results show that the proposed method increases the detection rate as well as decreases the false positive rate.
S. Mamatha, A. Damodaram, "Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.10, pp.32-39, 2014. DOI:10.5815/ijcnis.2014.10.04
[1]L. Zhou and Z. Haas, “Securing Ad hoc Networks”, IEEE Transaction on Networks, Vol. 13, no. 6, 1999, pp. 24-30.
[2]H. Deng, W. Li, and D. Agarwal , “Routing Security in Wireless Ad hoc Networks”, IEEE Comm. Magazine, Vol. 40, No 10, 2002, pp. 70-75.
[3]Paul Brutch and Calvin Ko,” Challenges in Intrusion detection for wireless Ad hoc network”,Proceedings of the Workshop on Security and Assurance in Ad hoc Networks in Orlando, Jan 2003, pp. 368-373.
[4]Kumar K, “Intrusion Detection in Mobile Ad hoc Networks”, Master’s Thesis, The University of Toledo 2009.
[5]S. Marti, T. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, In proceedings of MOBICOM 2000, pp. 255-265.
[6]Y. Zhang, W. Lee and Y. Huang, “Intrusion Detection in Wireless Ad hoc Networks”, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 2000, pp. 275-283.
[7]Lakshmi Venkatraman, “Securing Routing Protocol for Ad hoc Networks”, Master’s Thesis, University of Cincinnati, November 2000.
[8]S. Bharagava, D.P. Agarwal, “Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks”, IEEE Semi-annual Proceedings of Vehicular Technology Conference (VCT’01) 2001, pp. 2143-2147, ”doi:10.1109/VTC.2001.957123”.
[9]CY Tseng, P Balasubramanyam, C Ko, R Limprasittiporn, J Rowe, K, Levitt, “A Specification-based Intrusion Detection System for AODV”, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), Fairfax, VA, 2003, pp. 125-134.
[10]I. Stamouli, Patroklos Argyroudis and Hitesh Tewari, “Real Time Intrusion detection for Ad hoc Networks”, Proceedings of the sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WOWMOM’05), 2005, pp. 374-380.
[11]H. Yang, J. Shu, X. Meng and S. Lu, “SCAN: Self-organized Network-layer Security in Mobile Ad hoc Networks”, IEEE Journal on Selected Areas in Communications, vol24, No 2, Feb 2006, pp. 261-273.
[12]Oscar F. Gonzalez, Godwin Ansa, Michael Howarth and George Pavlou, “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad hoc Networks”, Journal of Internet Engineering vol. 2, No 1, June 2008, pp.181-192.
[13]Joo B. D. Cabrera, Raman K. Mehra and Carlos Gutirrez, "Ensemble Methods for Anomaly Detection and Distributed Intrusion Detection in Mobile Ad hoc Networks”, Information Fusion Journal, Vol. 9, Issue 1, Jan 2008, pp. 96-119.
[14]Li.T, Song M and Alam M, “Compromised Sensor Nodes Detection: A Quantitative Approach”, Proceedings of the IEEE International Conference on Distributed Computing Syatem.2008, pp. 352-357.
[15]M. Karami, Rafsanjani M, A. Fathi Navid, Y Yavari, "QAIDS: Quantitative and Agent based Intrusion Detection System”, Computer and Information Science Journal, Vol 4, No 2, March 2011, pp. 64-74.
[16]S. Mamatha and A. Damodaram, “Quantitative Behavior Based Intrusion Detection System for MANETS”, International Journal of Advances in Computer Networks and its Security, Vol 3,issue 2, June 2013, pp. 72-76.
[17]Kevin Fall and Kannan Vardhan, The ns Manual 2006, Available from http://www.mash.cs.berkley.edu/ns