FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks

In this paper, we introduce FORK, a novel two-pronged strategy to an agent-based intrusion detection system for ad-hoc networks. We follow two different but complementary approaches for intrusion detection in our proposed scheme. We perform intrusion detection for power-aware ad-hoc networks. We introduce a novel power and reputation-based auctioning scheme for distributing agent-tasks in the network. Nodes compete for, and win auctions for performing the tasks based on a competitive power-efficient mechanism that permits collaboration between nodes. The chosen nodes perform the intrusion detection using our proposed anomaly detection algorithm that is modeled on popular evolutionary algorithms techniques. We evaluate our system both in terms of the task allocation algorithm as well as results of actual intrusion detection performed in some session log files. The outcome is promising and offers scope for some interesting additional research.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[3]  Riccardo Poli,et al.  New ideas in optimization , 1999 .

[4]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[5]  Edson dos Santos Moreira,et al.  Implementation of an intrusion detection system based on mobile agents , 2000, 2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems.

[6]  Marco Dorigo,et al.  The ant colony optimization meta-heuristic , 1999 .

[7]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Ruijian Zhang Using Constructive induction To Enhance The Predictive Accuracy of the C5 Machine Learning Environment , 2004, IC-AI.

[10]  Udo W. Pooch,et al.  Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.

[11]  T. Srinivasan,et al.  A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks , 2005, ICCNMC.

[12]  Alex Alves Freitas,et al.  Data mining with an ant colony optimization algorithm , 2002, IEEE Trans. Evol. Comput..

[13]  D. Dasgupta,et al.  Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[14]  Sarit Kraus,et al.  Methods for Task Allocation via Agent Coalition Formation , 1998, Artif. Intell..

[15]  Risto Vaarandi,et al.  A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).

[16]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.

[17]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[18]  R. McAfee,et al.  Auctions and Bidding , 1986 .

[19]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[20]  Marco Dorigo,et al.  Swarm intelligence: from natural to artificial systems , 1999 .

[21]  Jizhou Sun,et al.  TJIDS: an intrusion detection architecture for distributed network , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[22]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[23]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[24]  Luca Maria Gambardella,et al.  Ant Algorithms for Discrete Optimization , 1999, Artificial Life.

[25]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[26]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[27]  Vasant Honavar,et al.  Lightweight agents for intrusion detection , 2003, J. Syst. Softw..

[28]  M.I. Heywood,et al.  Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[29]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[30]  R. Chandrasekar,et al.  An auction based task allocation scheme for power-aware intrusion detection in wireless ad-hoc networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.

[31]  Stephanie Wehner,et al.  Analyzing worms and network traffic using compression , 2005, J. Comput. Secur..

[32]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.