Probability Model for Intrusion Detection System in Mobile Adhoc Network

  • Authors

    • Bharathisindhu P
    • Dr S.SelvaBrunda
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.16722
  • Attacks, Intrusion Detection, MANET.
  • Wireless technologies increasingly exist everywhere in advanced networks; however, this new innovation accompanies its own set of challenges. The nodes in the wireless network are characteristically ‘open’ and viewable by all network scanners. Networks are protected using many firewalls and encryption software’s. Firewalls restrict access between networks to prevent intrusion and do not indicate an attack within the network. An Intrusion Detection System (IDS) is required which monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. In this paper, we propose a probability based IDS model that provides generalized solution to detect set of malicious nodes to improve the detection speed and accuracy.

     

  • References

    1. [1]Y.C.Hu, A.Perrig and D.B.Johnson, "Ariadne:A Secure on‑demand routing protocol for adhoc networks," Proc. of MobiCom '02, pp.2‑23, 2002.

      [2]Buchegger, S. and Le Boudec, J.Y, Performance analysis of the CONFIDANT protocol: Cooperation of nodes, fairness in dynamic ad-hoc networks. In Proceedings of MobiHoc’02.

      [3]Buttyan, L. and Hubaux, J.P, Enforcing service availability in mobile ad-hoc WANs. In Proceedings of the 1st ACM international Symposium on Mobile Ad Hoc Networking & Computing (Boston, Massachusetts).International Symposium on Mobile Ad Hoc Networking & Computing.IEEE Press, Piscataway, NJ, 87-96.

      [4]Hubaux, J-P., Gross, T., Boudec, Le and Vetterli, M, Toward self-organized mobile ad hoc networks: The terminodes project. In IEEE Communications Magazine.

      [5]Jakobsson, M., Hubaux, J-P. andButtyan, L., A micropayment scheme encouraging collaboration in multihop cellular networks. In Proceedings of Financial Cryptography, Jan 2003.

      [6]Marti, S., Giuli, T. J., Lai, K., and Baker.M, Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (Boston, Massachusetts, United States, August 06 - 11, 2000).MobiCom '00. ACM, New York, NY, 255-265..

      [7]K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, An acknowledgment-based approach for the detection of routing misbehaviour in MANETs, IEEE Trans. Mobile Computing,vol. 6, no. 5, pp. 536–550, May 2007.

      [8]A Al-Roubaiey et al., AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010,

      [9]T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs,‖ Int. J. Multimedia Systems, Vol.15, No.5, pp. 273–282, Oct. 2009

      [10]Muhammad Zeshan, Shoab A. Khan, Ahmad RazaCheema, and Attique Ahmed, "Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks," in International Seminar on Future Information Technology and Management Engineering, November 2008, pp. 568-572.

      [11]Nan Kang. Elhadi M. Shakshuki, Tarek R. Sheltami, “Detecting Misbehaving Nodes in MANETsâ€, iWAS2010, 8-10 November, 2010, Paris, France.
  • Downloads

  • How to Cite

    P, B., & S.SelvaBrunda, D. (2018). Probability Model for Intrusion Detection System in Mobile Adhoc Network. International Journal of Engineering & Technology, 7(2.20), 302-305. https://doi.org/10.14419/ijet.v7i2.20.16722