A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks

The rapid proliferation of wireless ad-hoc networks and mobile computing applications has changed the landscape of network security. In this paper, we use hybrid approach that have both misuse and anomaly intrusion detection system using cross feature analysis for obtaining the trained data and test data from the trace file and to model the intrusion detection pattern. Apart from detection based on trace data, we proposed an innovative technique which operates through the implementation of battery consumption based detection on wireless ad-hoc networks by correlating attacks with their impact on device power consumption on the fly. The proposed system monitors power behavior to detect potential intrusions by noting irregularities of power consumption. This proposed and implemented work of the IDS using Network Simulator (NS-2) has achieved high detection rate and low false positive rate.

[1]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[2]  H. Boland,et al.  Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[3]  Mohy Mahmoud,et al.  Securing the AODV protocol using specification-based intrusion detection , 2006, Q2SWinet '06.

[4]  Michael S. Hsiao,et al.  Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[5]  Henry L. Owen,et al.  Wireless intrusion detection and response , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[6]  Arnold P. Boedihardjo,et al.  Exploiting efficient data mining techniques to enhance intrusion detection systems , 2005, IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005..

[7]  Grant A. Jacoby,et al.  Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[8]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[9]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[10]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[11]  Mahmut T. Kandemir,et al.  The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.