Lightweight and distributed attack detection scheme in mobile ad hoc networks

Many of the widely used intrusion detection schemes, such as Self Organizing Map and Artificial Immune System, require heavy computational power in order to provide highly accurate results. These schemes have been successfully deployed in wired networks, which have high computational and bandwidth capabilities. Mobile ad hoc networks, however have limited resources and hence deploying such schemes are impractical. We propose a lightweight, low-computation, distributed intrusion detection scheme for mobile ad hoc networks termed the Distributed Hierarchical Graph Neuron (DHGN). The DHGN-based network is a new form of neural network, which consists of a hierarchical graph-based representation of input patterns. This pattern recognition scheme adopts a divide-and-distribute approach that divides an input pattern into a number of subpatterns, which are then concurrently processed for recognition. The first section of this paper provides an in-depth study of mobile ad hoc networks and current intrusion detection implementation in these networks. The second section of the paper provides an overview of the proposed two-stage cooperative intrusion detection system architecture and compares the proposed algorithm with Self Organizing Map classifier. The experiments show that our low computational scheme produced similar classification accuracy results to Self Organizing Map algorithm.

[1]  Azzedine Boukerche,et al.  A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[2]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[3]  Asad I. Khan,et al.  A Hierarchical Graph Neuron Scheme for Real-Time Pattern Recognition , 2008, IEEE Transactions on Neural Networks.

[4]  Erland Jonsson,et al.  Survey of Intrusion Detection Research , 2002 .

[5]  Udo W. Pooch,et al.  Routing anomaly detection in mobile ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[6]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[7]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[8]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[9]  M. Gerla,et al.  P 2 P MANETs – New Research Issues , 2005 .

[10]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[11]  Esa Alhoniemi,et al.  Self-Organizing Map for Data Mining in MATLAB: The SOM Toolbox , 1999 .

[12]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[13]  Asad I. Khan,et al.  A peer-to-peer associative memory network for intelligent information systems , 2002 .

[14]  Hongxia Xie,et al.  Notice of Violation of IEEE Publication PrinciplesAn Intrusion Detection Architecture for Ad Hoc Network Based on Artificial Immune System , 2006, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06).

[15]  Wei Sat,et al.  Guidelines on Selecting Intrusion Detection Methods in MANET , 2004 .

[16]  R.A. Raja Mahmood,et al.  A Distributed Hierarchical Graph Neuron-Based Classifier: An Efficient, Low-Computational Classifier , 2008, 2008 First International Conference on Intelligent Networks and Intelligent Systems.

[17]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[18]  Lixin Xu,et al.  An intrusion detection system model based on self-organizing map , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[19]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[20]  Antony I. T. Rowstron,et al.  P2P MANET's - New Research Issues , 2005, Peer-to-Peer Mobile Ad Hoc Networks.

[21]  Cheng Zhang,et al.  Network Intrusion Active Defense Model Based on Artificial Immune System , 2008, 2008 Fourth International Conference on Natural Computation.

[22]  A. Karygiannis,et al.  Host-based network monitoring tools for MANETs , 2006, PE-WASUN '06.

[23]  Anang Hudaya Muhamad Amin,et al.  One Shot Associative Memory Method for Distorted Pattern Recognition , 2007, Australian Conference on Artificial Intelligence.

[24]  Jinyuan You,et al.  POM-a mobile agent security model against malicious hosts , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.

[25]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[26]  Teuvo Kohonen,et al.  Self-Organizing Maps, Third Edition , 2001, Springer Series in Information Sciences.