CFP last date
20 May 2024
Reseach Article

Risk Aware Intrusion Detection and Response Mechanism for MANET

by Rama S. Hajari, Veeresh G. Kasabegoudar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 15
Year of Publication: 2015
Authors: Rama S. Hajari, Veeresh G. Kasabegoudar
10.5120/19745-1560

Rama S. Hajari, Veeresh G. Kasabegoudar . Risk Aware Intrusion Detection and Response Mechanism for MANET. International Journal of Computer Applications. 112, 15 ( February 2015), 30-33. DOI=10.5120/19745-1560

@article{ 10.5120/19745-1560,
author = { Rama S. Hajari, Veeresh G. Kasabegoudar },
title = { Risk Aware Intrusion Detection and Response Mechanism for MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 15 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number15/19745-1560/ },
doi = { 10.5120/19745-1560 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:35.767482+05:30
%A Rama S. Hajari
%A Veeresh G. Kasabegoudar
%T Risk Aware Intrusion Detection and Response Mechanism for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 15
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is going on in the area of Intrusion detection, and response techniques to appease critical attacks. In existing system, binary isolation and DRC techniques are used to isolate the malicious nodes. However, binary isolation leads to unexpected network partitioning and DRC is associative and non-weighted. Therefore, in this paper, we present an adaptive risk-aware response mechanism using CSS-OLSR cooperative security scheme OLSR based on an extended Dempster-Shafer mathematical theory of evidence. The effectiveness of security mechanism is demonstrated by using network simulator NS2 software in which various metrics shows secured performance of the network.

References
  1. C. Perkins, E. Belding-Royer, and S. Das, "Adhoc on demand distance vector (AODV) routing," IETF RFC 3561, July 2003
  2. T. Clausen et. al. , "Optimized link state routing protocol," IETF Internet Draft, July 2003.
  3. S. Wang, C. Tseng, K. Levitt, and M. Bishop, "Cost-sensitive intrusion responses for mobile adhoc networks," Proc. 10th Int'l Symp. Recent Advances in Intrusion Detection (RAID '07), pp. 127-145, 2007.
  4. L. Sun, R. Srivastava, and T. Mock, "An information systems security risk assessment model under the Dempster-Shafer theory of belief functions," J. Management Information Systems, vol. 22, no. 4, pp. 109-142, 2006.
  5. C. Mu, X. Li, H. Huang, and S. Tian, "Online risk assessment of intrusion scenarios using D-S evidence theory," Proc. 13th European Symp. Research in Computer Security (ESORICS '08), pp. 35-48, 2008.
  6. K. Sentz and S. Ferson, "Combination of evidence in Dempster-Shafer Theory," Technical Report, Sandia Nat'l Laboratories, 2002
  7. L. Zadeh, "Review of a mathematical theory of evidence," AI Magazine, vol. 5, no. 3, p. 81, 1984.
  8. R. Yager, "On the Dempster-Shafer framework and new combination rules_1," Information Sciences, vol. 41, no. 2, pp. 93-137, 1987.
  9. H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor fusion using Dempster-Shafer theory," Proc. IEEE Instrumentation and Measurement Technology Conf. , vol. 1, pp. 7-12,2002.
  10. Z. Zhao, H. Hu, R. Wu and G. Ann, "Risk-aware mitigation for MANET routing attacks", IEEE transactions on Dependable and Secure Computing, vol. 9, no. 2, March 2012
  11. C. Adjih, E. Baccelli and P. Jacquet, "Link state routing in wireless ad-hoc networks", MILCOM2003, Monterey, CA, Oct 2003.
  12. J. P. Vilela and J. Barros "Daidalos IST Project: Designing advanced interfaces for the delivery and administration of location independent optimised personal services," (FP6-2002-IST-1-506997). http://www. ist-daidalos. org.
  13. K. Fall and K. Varadhan, "The NS manual," 2010.
  14. F. Ros, "UM-OLSR implementation (version 0. 8. 8) for NS2," 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile adhoc networks Intrusion response Dempster-Shafer theory