An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes

Objectives: Mobile Adhoc Networks (MANETs) due to their dynamic topology are more liable to have security problems. These Adhoc Networks are easily susceptible to various types of attacker nodes. Out of the numerous attacks black hole, flooding and selective packet drop attacks are more hazardous attacks which reduce the performance of network under various parameters. Due to this problem, there is a need to develop a new approach for mitigating these attacker nodes simultaneously to improve the performance of MANETs Methods: An Intelligent Intrusion Detection and Prevention System (IIDPS) is proposed for preventing the ad hoc network from these three types of attacks under the AODV protocol. The proposed mechanism works on the basis of trust management. This research work consists of a central network administrator for detecting malicious nodes in the MANETs. IIDPS includes a trust manager which categorizes the trust of the network into different categories. Different types of malicious nodes are identified by the behavior classifier based on a predefined threshold and risk factor conditions. Findings: The proposed IIDPS is responsible for preventing MANETs from the black hole, flooding, and selective packet drop attacker nodes. At the same time, the proposed prevention system improves the performance of the network in the terms of numerous parameters like throughput, overhead, delay, packet delivery ratio etc. Novelty/ Improvement: There is no technique exist for MANETs under AODV protocol for detecting black hole, flooding and selective packet drop malicious nodes. The proposed IIDPS solves this issue to handle of these multiple attacks at the same time.

[1]  Shangguang Wang,et al.  Detecting SYN flooding attacks based on traffic prediction , 2012, Secur. Commun. Networks.

[2]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[3]  M. Karthikeyan,et al.  Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..

[4]  Lyes Khoukhi,et al.  Flooding attacks detection in MANETs , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[5]  Mahdieh Ghazvini,et al.  A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.

[6]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[7]  ShahabiSina,et al.  A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2016 .

[8]  Jigyasu Dubey,et al.  A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET , 2016, ICTCS '16.

[9]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[10]  Ilango Krishnamurthi,et al.  Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..

[11]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[12]  Winston Khoon Guan Seah,et al.  Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..

[13]  Makoto Yokoo,et al.  A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks , 2012, Comput. Commun..

[14]  Shifei Ding,et al.  Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN , 2015, Int. J. Distributed Sens. Networks.

[15]  Abdul Hanan Abdullah,et al.  F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs , 2017, J. King Saud Univ. Comput. Inf. Sci..

[16]  Daniel Gutiérrez-Reina,et al.  Hybrid Flooding Scheme for Mobile Ad Hoc Networks , 2013, IEEE Communications Letters.

[17]  Chu-Hsing Lin,et al.  Lifetime elongation of ad hoc networks under flooding attack using power-saving technique , 2014, Ad Hoc Networks.

[18]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[19]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[20]  Shiyong Zhang,et al.  Flooding attack and defence in Ad hoc networks , 2006 .

[21]  Hassan Artail,et al.  A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.

[22]  Gang Qu,et al.  Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs , 2013, Int. J. Distributed Sens. Networks.

[23]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[24]  Jatinder Singh,et al.  Analysis of Intrusion Detection Tools for Wireless Local Area Networks , 2009 .

[25]  N. Sreenath,et al.  Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol , 2016 .

[26]  Angelos Stavrou,et al.  Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications , 2013, Wirel. Pers. Commun..

[27]  M. Rajesh Babu,et al.  A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET , 2016, Wirel. Pers. Commun..

[28]  Somnuk Puangpronpitag,et al.  A novel challenge & response scheme against selective forwarding attacks in MANETs , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[29]  Ayyaswamy Kathirvel,et al.  A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT , 2015, EURASIP J. Wirel. Commun. Netw..

[30]  R. Manimegalai,et al.  TRUST BASED ROUTING TO MITIGATE BLACK HOLE ATTACK IN MANET , 2013 .

[31]  Michel Barbeau,et al.  A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs , 2013, J. Netw. Comput. Appl..

[32]  Christoforos Ntantogian,et al.  Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks , 2017, Comput. Networks.

[33]  Haiying Shen,et al.  Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.

[34]  B. Paramasivan,et al.  Ant based Defense Mechanism for Selective Forwarding Attack in MANET , 2015, 2015 31st IEEE International Conference on Data Engineering Workshops.

[35]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[36]  Myung-Sup Kim,et al.  Traffic Flooding Attack Detection on SNMP MIB Using SVM , 2008 .

[37]  R Bouallegue,et al.  Handoff Management in Green FEMTOCELL Network , 2011 .

[38]  Shashi Gurung,et al.  A novel approach for mitigating gray hole attack in MANET , 2018, Wirel. Networks.

[39]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[40]  Muhamad Rifqi Rifquddin,et al.  Performance of AOMDV routing protocol under rushing and flooding attacks in MANET , 2015, 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE).

[41]  Arya Megha,et al.  Grayhole Attack and Prevention in Mobile Adhoc Network , 2011 .