CFP last date
22 April 2024
Reseach Article

Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm

Published on None 2010 by Farhan Abdel-Fattah, Zulkhairi Md. Dahalin, Shaidah Jusoh
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 1
None 2010
Authors: Farhan Abdel-Fattah, Zulkhairi Md. Dahalin, Shaidah Jusoh
85899195-1d18-4093-bcef-845cebbf5640

Farhan Abdel-Fattah, Zulkhairi Md. Dahalin, Shaidah Jusoh . Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm. Mobile Ad-hoc Networks. MANETS, 1 (None 2010), 22-29.

@article{
author = { Farhan Abdel-Fattah, Zulkhairi Md. Dahalin, Shaidah Jusoh },
title = { Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 1 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 22-29 },
numpages = 8,
url = { /specialissues/manets/number1/1011-48/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Farhan Abdel-Fattah
%A Zulkhairi Md. Dahalin
%A Shaidah Jusoh
%T Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 1
%P 22-29
%D 2010
%I International Journal of Computer Applications
Abstract

Mobile Ad hoc networks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of the networks. However, all such intrusion detection techniques suffer from performance penalties and high false alarm rates. In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distance-based Outlier Detection (CPDOD) algorithm. A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.

References
  1. Detecting outliers using transduction and statistical testing. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 55_64, New York, NY, USA, 2006. ACM.
  2. Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A survey. ACM Comput. Surv., 41(3):1_58, 2009.
  3. Hongmei Deng, Roger Xu, Jason Li, Frank Zhang, Renato Levy, andWenke Lee. Agent-based cooperative anomaly detection for wireless ad hoc networks. In ICPADS '06: Proceedings of the 12th International Conference on Parallel and Distributed Systems, pages 613_620, Washington, DC, USA, 2006.
  4. Yingfang Fu, Jingsha He, and Guorui Li. A distributed intrusion detection scheme for mobile ad hoc networks. Computer Software and Applications Conference, Annual International, 2:75_80, 2007.
  5. Alex Gammerman and Volodya Vovk. Prediction algorithms and con_dence measures based on algorithmic randomness theory. Theor. Comput. Sci., 287(1):209_217, 2002.
  6. Alexander Gammerman and Vladimir Vovk. Hedging predictions in machine learning. Comput. J., 50(2):151_163, 2007.
  7. GloMoSim. Glomosim website, June 2007.
  8. Yi-an Huang, Wei Fan, Wenke Lee, and Philip S. Yu. Cross-feature analysis for detecting ad-hoc routing anomalies. In ICDCS '03: Proceedings of the 23rd International Conference on Distributed Computing Systems, page 478, Washington, DC, USA, 2003. IEEE Computer Society.
  9. A. Karygiannis, E. Antonakakis, and A. Apostolopoulos. Host-based network monitoring tools for manets. In PE-WASUN '06: Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks, pages 153_157, New York, NY, USA, 2006. ACM.
  10. Yang Li, Binxing Fang, Li Guo, and You Chen. Network anomaly detection based on tcm-knn algorithm. In ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 13_19, New York, NY, USA, 2007. ACM.
  11. Yang Li and Li Guo. An active learning based tcm-knn algorithm for supervised network intrusion detection. Computers & Security, 26(7-8):459_467, 2007.
  12. Yihua Liao and V. Rao Vemuri. Use of k-nearest neighbor classifier for intrusion detection, 2002.
  13. Tom M. Mitchell. Machine Learning. McGraw-Hill, New York, 1997.
  14. C. Siva Ram Murthy and B.S. Manoj. Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2004
  15. Hadi Otrok, Joey Paquet, Mourad Debbabi, and Prabir Bhattacharya. Testing intrusion detection systems in manet: A comprehensive study. Communication Networks and Services Research, Annual Conference on, 0:364_371, 2007.
  16. Animesh Patcha and Jung-Min Park. Network anomaly detection with incomplete audit data. Comput. Netw., 51(13):3935_3955, 2007.
  17. Charles Perkins and Elizabeth Royer. Ad-hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90_100, 1997.
  18. Glenn Shafer and Vladimir Vovk. A tutorial on conformal prediction. J. Mach. Learn. Res., 9:371_421, 2008.
  19. W J Ulivla. Evaluation of intrusion detection system. J. J. Res. Natl. Inst. Stand. Technol., 108(6):453_473, 2003.
  20. Liwei vivian Kuang. Dnids: A dependable network intrusion detection system using the csi-knn algorithm, 2007
  21. Fu Xiao and Xie Li. Using outlier detection to reduce false positives in intrusion detection. In NPC '08: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, pages 26_33, Washington, DC, USA, 2008. IEEE Computer Society.
  22. Ke Zhang, Marcus Hutter, and Huidong Jin. A new local distancebased outlier detection approach for scattered real-world data. CoRR, abs/0903.3257, 2009.
  23. Yongguang Zhang, Wenke Lee, and Yi-An Huang. Intrusion detection techniques for mobile wireless networks. Wirel. Netw., 9(5):545_556, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Intrusion detection CPDOD CP-KNN Dynamic intrusion detection Conformal Prediction