Implementation of neural networks for intrusion detection in manet

A MANET is a collection of mobile nodes that organize themselves into a network without any predefined infrastructure or centralized operation management and because of its especial features, is vulnerable to security attacks. In recent years, different approaches are implemented to improve the security level of MANET. The aim of this paper is to design a mechanism of intrusion detection in the MANET on the basis of artificial neural networks (ANNs) to detect Dos attacks. In a type of DOS attack, considered in this paper, an intruder node injects a large amount of junk packets into the network and causes a denial in the services of the attacked node. Using a simulated MANET environment, ANNs modeling for detecting the DOS attack is investigated and it is showed that model can detect nodes under Dos attack effectively.

[1]  H. Chris Tseng,et al.  Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.

[2]  Security within Ad hoc Networks , 2002 .

[3]  Dan Feng Ant System for a Multi-vehicle Routing Problem , 2007 .

[4]  Wei Sat,et al.  Guidelines on Selecting Intrusion Detection Methods in MANET , 2004 .

[5]  Sheng Wang,et al.  A Novel Approach to Manage Trust in Ad Hoc Networks , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[6]  Christopher Leckie,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[7]  Syed Sajjad Rizvi,et al.  A novel approach for creating trust to reduce malicious behavior in MANET , 2007, CoNEXT '07.

[8]  Sylvie Perreau,et al.  A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[9]  Essam Natsheh,et al.  Multivariate Fuzzy Analysis for Mobile Ad hoc Network Threat Detection , 2008, Int. J. Bus. Data Commun. Netw..

[10]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[11]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[12]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[13]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[14]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.