Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)

Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of the mobile applications have been introduced. Limited research was reported that particularly focuses to enhance the security of those pardigms and provide secure MCL to users. The paper handles the issue of rogue DHCP server that affects and disrupts the network resources during the MCL. The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides the privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms through addition of new rules in IDS and mathematcal model. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with other existing techniques. General Terms: Design , Development , Theory. Index Terms Client, DHCP server, rogue DHCP server, mobile learning environment, algorithms, signature-cum anomaly based Intrusion detection. Inclusion of IDS rules, sniffer, nikito, stick.

[1]  Sapna S. Kaushik,et al.  Detection of Attacks in an Intrusion Detection System , 2011 .

[2]  Mohamed S. Kamel,et al.  An aggregated clustering approach using multi-ant colonies algorithms , 2006, Pattern Recognit..

[3]  William Stallings Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .

[4]  Vasant Honavar,et al.  Automated discovery of concise predictive rules for intrusion detection , 2002, J. Syst. Softw..

[5]  S. Janakiraman,et al.  ACO based Distributed Intrusion Detection System , 2009, J. Digit. Content Technol. its Appl..

[6]  Dewan Md. Farid,et al.  Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.

[7]  Minjie Zhang,et al.  P2P Distributed Intrusion Detections by Using Mobile Agents , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).

[8]  Su-Ping Chen,et al.  INTRUSION DETECTION USING A HYBRID SUPPORT VECTOR MACHINE BASED ON ENTROPY AND TF-IDF , 2008 .

[9]  Heejo Lee,et al.  On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[10]  A. S. Sodiya,et al.  Issue S in Informing Science and Information Technology a Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems , 2022 .

[12]  Paul Francis,et al.  Mitigating DNS DoS attacks , 2008, CCS.

[13]  Roland Sauerbrey,et al.  Biography , 1992, Ann. Pure Appl. Log..

[14]  Habiba Drias,et al.  Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents , 2006, 2006 International Conference on Dependability of Computer Systems.

[15]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[16]  Lee Garber,et al.  Denial-of-Service Attacks Rip the Internet , 2000, Computer.

[17]  A. S. Saxena,et al.  CONCEIVING AINTRUSION DETECTION SYSTEM IN THE NETWORK BY MOBILEAGENTS , 2011 .

[18]  Gouda I. Salama,et al.  Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .

[19]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[20]  Azizah Abdul Rahman,et al.  Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents , 2010, ArXiv.