A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. Ad hoc also contains wireless sensor network so the problems is facing by sensor network is also faced by MANET. While developing the sensor nodes in unattended environment increases the chances of various attacks. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. maximizing due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this paper we discussed some attacks on MANET and DDOS also and provide the security against the DDOS attack. General Terms Security, algorithms, distributed denial of attack, intrusion detection system.

[1]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[2]  Shui Yu,et al.  CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[3]  Chu-Hsing Lin,et al.  Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[4]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[5]  Y. Venkataramani,et al.  DDoS Attack and Defense Scheme in Wireless Ad hoc Networks , 2011, ArXiv.

[6]  Xiapu Luo,et al.  Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..

[7]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[8]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[9]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[10]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[11]  David K. Y. Yau,et al.  Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.

[12]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[13]  Sung-Ho Kim,et al.  DDoS flooding attack detection through a step-by-step investigation , 2011, 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications.

[14]  Sukumar Nandi,et al.  QoS Aware Stable path Routing (QASR) Protocol for MANETs , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[15]  Dae-Wha Seo,et al.  Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).

[16]  Mohammad Najmud Doja,et al.  Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .

[17]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[19]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.