A Novel Framework of Dynamic Learning Based Intrusion Detection Approach in MANET

With the growth of security and surveillance system, a huge amount of audit or network data is being generated. It is immense challenge for researcher to protect the mobile ad hoc network from the malicious node as topology of the network dynamically changes. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of normal network behavior and then identify a node's behavior to be anomalous if it deviates from the established profile. As the topology of a MANET constantly changes over time, the simple use of a static base profile is not efficient. In this paper, a novel framework is proposed to detect the malicious node in MANET. In proposed method k-means clustering-based anomaly detection approach is used in which the profile is dynamically updated. The approach consists of three main phases: training, testing and updating. In training phase, the K-means clustering algorithm is used in order to establish a normal profile. In testing phase, check whether the current traffic of the node is normal or anomalous. If it is normal then update the normal profile otherwise isolate the malicious node and ignore that node from the network. To update the normal profile periodically, weighted coefficients and a forgetting equation is used.

[1]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[2]  Fatemeh Barani,et al.  BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms , 2012, ISC Int. J. Inf. Secur..

[3]  Yi Lu,et al.  Research on Network anomaly Detection Based on Clustering and Classifier , 2006, 2006 International Conference on Computational Intelligence and Security.

[4]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[5]  P. Mohanakrishnan,et al.  An Intuitive Signal Processing Approach for Temperature Fluctuations in Fuel Subassemblies , 2011 .

[6]  Kumar Jain Yogendra Intrusion Detection using Supervised Learning with Feature Set Reduction , 2011 .

[7]  Udo W. Pooch,et al.  Towards adaptive intrusion detection in mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[8]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[9]  S. Mamatha,et al.  BEHAVIORAL INTRUSION DETECTION IN MOBILE AD HOC NETWORKS , 2013 .

[10]  Mahdi Abadi,et al.  A dynamic clustering-based approach for anomaly detection in AODV-based MANETs , 2011, 2011 International Symposium on Computer Networks and Distributed Systems (CNDS).

[11]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[12]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[13]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[14]  Christos Dimitrakakis,et al.  Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.

[15]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[16]  Tony Thomas,et al.  Anonymity, unlinkability and unobservability in mobile ad hoc networks , 2014, 2014 International Conference on Communication and Signal Processing.

[17]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[18]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .