A SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORK

Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. Ad hoc also contains wireless sensor network so the problems is facing by sensor network is also faced by MANET. While developing the sensor nodes in unattended environment increases the chances of various attacks. The Intrusion Detection is one of the possible ways in recognizing a possible attacks before the system could be penetrated. The encryption and authentication solution, which are considered as the first line of defense, are no longer sufficient to protect MANETs. Therefore, Intrusion Detection Systems (IDSs) is needed to be the second line of defense to protect the network from security problem. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. "A Secure Intrusion Detection System against DDOS attack in MANET" in this project discussed on the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. maximizing due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this paper we discussed some attacks on MANET and DDOS also and provide the security against the DDOS attack.

[1]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[2]  Sung-Ho Kim,et al.  DDoS flooding attack detection through a step-by-step investigation , 2011, 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications.

[3]  Sukumar Nandi,et al.  QoS Aware Stable path Routing (QASR) Protocol for MANETs , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[4]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[7]  S. S. Sherekar,et al.  Study of Intrusion Detection Techniques in MANET , 2012 .

[8]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[9]  Dae-Wha Seo,et al.  Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).

[10]  David K. Y. Yau,et al.  Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.

[11]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[12]  Xiapu Luo,et al.  Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..

[13]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[14]  Mohammad Najmud Doja,et al.  Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .

[15]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[16]  Chu-Hsing Lin,et al.  Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[17]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[18]  Y. Venkataramani,et al.  DDoS Attack and Defense Scheme in Wireless Ad hoc Networks , 2011, ArXiv.

[19]  Karen Sparck Jones,et al.  The Key Concepts , 2004 .