TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents

Many intrusion detection algorithms have been proposed to detect network attacks on Mobile Ad-Hoc Networks (MANET). Most of such proposals require extensive modifications to routing algorithms or lower layers which might not be always feasible in practice. This paper proposes a simple but non-trivial scheme TraceGray, that uses mobile agents (MA) to carry out intrusion detection in a MANET without modifying either the underlying routing algorithms or other layers like the datalink layer. TraceGray works only in the application layer and detects multiple gray holes in a DSR protocol based MANET, while traversing the network from a given source to a destination. Since mobile agents work in the application layer, our approach requires no changes to any existing routing protocols or lower layers and is essentially protocol independent. The ns-2 based implementation show successful detection of multiple gray holes in networks with moderate mobility.

[1]  Lawrence Osborne,et al.  Performance analysis of mobile agents in wireless internet applications using simulation , 2004, Parallel and Distributed Computing and Networks.

[2]  A. S. Sodiya,et al.  Issue S in Informing Science and Information Technology a Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems , 2022 .

[3]  Jaydip Sen,et al.  A distributed protocol for detection of packet dropping attack in mobile ad hoc networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[4]  Chen Wei,et al.  A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc Networks , 2007, 2007 Second International Conference on Communications and Networking in China.

[5]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[6]  Alan Holt,et al.  Performance analysis of mobile agents , 2007, IET Commun..

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Djamel Djenouri,et al.  Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks , 2006, IWSOS/EuroNGI.

[9]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[10]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[11]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.