A Novel Cross Layer Intrusion Detection System in MANET

Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper, we have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes and different types of DoS attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. We have used cooperative anomaly intrusion detection with data mining technique to enhance the proposed architecture. We have implemented fixed width clustering algorithm for efficient detection of the anomalies in the MANET traffic and also generated different types of attacks in the network. The simulation of the proposed architecture is performed in OPNET simulator and we got the result as we expected.

[1]  Kôki Abe,et al.  Protocol specification-based intrusion detection system for VoIP (情報ネットワーク) , 2008 .

[2]  Hong Man,et al.  A distributed cross-layer intrusion detection system forad hoc networks , 2006, Ann. des Télécommunications.

[3]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[4]  Song Jian-hua,et al.  Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks , 2007, 2007 Second International Conference on Communications and Networking in China.

[5]  Charles E. Perkins,et al.  Mobile IP Authentication, Authorization, and Accounting Requirements , 2000, RFC.

[6]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[7]  Yang Li,et al.  Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[9]  Bu-Sung Lee,et al.  CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[10]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[11]  Bu-Sung Lee,et al.  Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.

[12]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[13]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[14]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[15]  Tai Hoon Kim AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS , 2008 .

[16]  John S. Baras,et al.  Attacks and Defenses Utilizing Cross-Layer Interactions in MANET , 2004 .

[17]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[18]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[19]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[20]  Andrea J. Goldsmith,et al.  Design challenges for energy-constrained ad hoc wireless networks , 2002, IEEE Wirel. Commun..