A DYNAMIC APPROACH FOR IMPROVING PERFORMANCE OF INTRUSION DETECTION SYSTEM OVER MANET

A Mobile Ad-hoc Network (MANET) is one of the busy and public networks; Because of this the network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present that falsely claim itself as a valid node. It will accept the information and will not forward the information to next nodes. Intrusion Detection System (IDS) will be used to detect such kind of attacks, but these attacks slows down the performance of IDS. To improve the performance of IDS and to handle these attacks we have presented an attack avoidance scheme. In which a preventive path will be discovered in which not attacker node will be covered. The detected path may be wider than the shortest path but will provide the higher throughput and reduce the data loss over the network. In our present work we record an interconnection table to track the communication information over the network. The INVERTED TABLE APPROACH will be used to maintain this table. Once the table will be defined, the DATA MINING APPROACH will be used to identify the attacker nodes. The work will be implemented in NS2.35 and the result analysis will be driven based on throughput and the loss analysis.

[1]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[2]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[3]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[4]  Saurabh Mukherjee,et al.  Layered approach for intrusion detection using naïve Bayes classifier , 2012, ICACCI '12.

[5]  Mehdi Kargar,et al.  T ruthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes , 2009 .

[6]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[7]  Joohan Lee,et al.  A dynamic data mining technique for intrusion detection systems , 2005, ACM Southeast Regional Conference.

[8]  Guanhua Yan,et al.  Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Yasushi Wakahara,et al.  Proposal of a method to detect black hole attack in MANET , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[11]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[12]  Poonam Pahuja,et al.  ROUTING MANAGEMENT FOR MOBILE AD-HOC NETWORKS , 2013 .

[13]  Kavé Salamatian,et al.  Anomaly extraction in backbone networks using association rules , 2009, IMC '09.

[14]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[15]  Yuh-Jye Lee,et al.  A three-tier IDS via data mining approach , 2007, MineNet '07.

[16]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[17]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[18]  Vera Marinova-Boncheva Applying a data mining method for intrusion detection , 2007, CompSysTech '07.

[19]  B. B. Meshram,et al.  Intrusion prevention systems: data mining approach , 2010, ICWET.

[20]  Zunping Cheng,et al.  Statistical attack detection , 2009, RecSys '09.

[21]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[22]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[23]  Ignas G. Niemegeers,et al.  Research Issues in Ad-Hoc Distributed Personal Networking , 2003, Wirel. Pers. Commun..

[24]  M. Hemalatha,et al.  An evaluation of clustering technique over intrusion detection system , 2012, ICACCI '12.

[25]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[26]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[27]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[28]  G S Mamatha,et al.  Analyzing The Manet Variations, Challenges, Capacity And Protocal Issues , 2010 .

[29]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[30]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[31]  Aishwarya Nandakumar,et al.  Wireless intrusion detection based on different clustering approaches , 2010, A2CWiC '10.

[32]  M. Wahengbam,et al.  Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[33]  Prodipto Das,et al.  Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.

[34]  Masoud Sabaei,et al.  An efficient reputation-based mechanism to enforce cooperation in MANETs , 2009, 2009 International Conference on Application of Information and Communication Technologies.

[35]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[36]  Indu Singh,et al.  An Improved Inverted table Approach to Detect Selfish Node In Mobile Ad Hoc Network , 2012 .

[37]  Syeda Gauhar Fatima,et al.  ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR WSN , 2012 .

[38]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[39]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[40]  Xiaoyan Hong,et al.  A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..