CFP last date
22 April 2024
Reseach Article

Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents

by Praveen Kumar Madala, G Nagappan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 6
Year of Publication: 2011
Authors: Praveen Kumar Madala, G Nagappan
10.5120/2227-2837

Praveen Kumar Madala, G Nagappan . Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents. International Journal of Computer Applications. 17, 6 ( March 2011), 6-11. DOI=10.5120/2227-2837

@article{ 10.5120/2227-2837,
author = { Praveen Kumar Madala, G Nagappan },
title = { Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 6 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number6/2227-2837/ },
doi = { 10.5120/2227-2837 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:51.868496+05:30
%A Praveen Kumar Madala
%A G Nagappan
%T Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 6
%P 6-11
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Power-aware hybrid intrusion detection in wireless ad hoc networks using mobile agents (PHIDS) describes design and implementation of an energy conscious anomaly based co operative intrusion detection system for wireless ad hoc networks based on mobile agent technology. This paper addresses the above stated issue by (1) Applying mobile agent technology to minimize network load, conserving bandwidth and to improve reactivity. (2)Minimize energy consumption of network monitoring nodes by using power metric node selection algorithm.(3) It integrates both host based and network based intrusion detection system. IBM’s Aglet is used as the base agent architecture to create mobile agents such as monitoring agent, decision-making agent and action agent. Host based intrusion detection system take care of local intrusion detection on each node. Network based intrusion detection system take care of cooperative intrusion detection at network level.

References
  1. T.Srinivasan, V. Mahadevan, A. Meyyappan, A.Manikandan, M.Nivedita, N.Pavithra, “Hybrid Agents for Power Aware Intrusion Detection in Highly Mobile Ad-hoc networks”, International Conference on Systems and Network Communication (ICSNC’06) October 2006.
  2. Zeng-Quan Wang, Hui-Qiang Wang, Qian Zhao, Rui-Jie Zhang , “ Research on Intrusion Detection System”, Proceedings of the 5th International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006.
  3. Hongmei Deng, Roger Xu, Jason Li, Frank Zhang, Renato Levy, Wenke Lee, “Agent - based Cooperative Anomaly Detection for wireless Ad Hoc Networks”, Proceedings of the 12th International Conference on Parallel and Distributed Systems (ICPADS’06). 12-15 July 2006, Volume: 1, pp. 613620.
  4. Dalia Boughaci, Habiba drias, Ahmed Bendib, Youcef Bouznit and Belaid Benhamou, “A Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents”, Proceedings of the International Conference on Dependability of Computer Systems (DEPCOS RELCOMEX’06) pp 248-255 May 2006.
  5. T. Srinivasan, Vivek Vijaykumar, R. Chandrasekhar, “An auction based task allocation scheme for power–aware intrusion detection in wireless ad- hoc networks”, International Conference on Wireless and optimal communication networks, 11-13 April 2006.
  6. Abdulrahman Hijazi, Nidal Nasser, “Using mobile agents for intrusion detection in wireless ad hoc networks”, Wireless and Optical Communications Networks WOCN 2005, Second IFIP International Conference on 6-8 March 2005, pp 362-366.
  7. Abdelhamid Belmekki, Abdellatif Mezrioui, “Using active agent for intrusion detection and management” Proceedings of the 2005 International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’05).
  8. Islam M. Hegazy, Hassam M. Faheem, Taha Al-Arif, Tawfik Ahmed, “Evaluating how well agent-based IDS perform”, IEEE Potentials, May2005.
  9. Noria Foukia, “IDReAM: Intrusion detection and response executed with agent mobility architecture and implementation”, AAMAS’05, July 25-29, 2005, Utrecht, Netherlands. ACM.
  10. Mishra, A. Nadkarni, K., Patcha, A., “Intrusion detection in wireless ad hoc networks”, IEEE Wireless Communications Volume: 11, Issue: 1, 2004, pp 48-60.
  11. Yan Xia, Ren-Fa li, Ken- Li Li, “ Intrusion detection using mobile agent in ad hoc networks”, Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, 26-29 August 2004.
  12. Y.Zhang, W.Lee, and Y.-A. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM J. Wireless Net. vol. 9, no. 5, Sept. 2003, pp. 545–56.
  13. O.Kachirski, R. Guha, “Intrusion detection using mobile agents in wireless ad hoc networks”, Proceedings of the IEEE Workshop on Knowledge Media Networking (KMN’02), July 10-12, 2002, pp.153-58.
  14. P.Albers “Security in Ad hoc Networks: a General Intrusion Detection Architecture Enhancing Trust based Approaches”, First International Workshop on Wireless Information System, Spain Apr 3-6 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Agent based architecture intrusion detection wireless ad-hoc networks