CFP last date
20 May 2024
Reseach Article

A Constructive Intrusion Detection System for Preventing Attacks in Mobile ADHOC Networks

by T. Kamaleshwar, K. Venkatachalapathy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 26
Year of Publication: 2018
Authors: T. Kamaleshwar, K. Venkatachalapathy
10.5120/ijca2018916554

T. Kamaleshwar, K. Venkatachalapathy . A Constructive Intrusion Detection System for Preventing Attacks in Mobile ADHOC Networks. International Journal of Computer Applications. 179, 26 ( Mar 2018), 26-30. DOI=10.5120/ijca2018916554

@article{ 10.5120/ijca2018916554,
author = { T. Kamaleshwar, K. Venkatachalapathy },
title = { A Constructive Intrusion Detection System for Preventing Attacks in Mobile ADHOC Networks },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 179 },
number = { 26 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number26/29098-2018916554/ },
doi = { 10.5120/ijca2018916554 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:35.059262+05:30
%A T. Kamaleshwar
%A K. Venkatachalapathy
%T A Constructive Intrusion Detection System for Preventing Attacks in Mobile ADHOC Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 26
%P 26-30
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Adhoc Network (MANET) is an independent system of mobile nodes connected by wireless system. The nodes are free to change dynamically and it can change the topology for the requirement. It establishing an efficient and ideal route between the communicating nodes is the elemental concern of the routing protocols of MANET. Each node not only acts as end system, but also acts as a router to forward packets. In MANET it is very difficult to design the robust security solution for various attacks. Here we are analyzing overall performance as well as the security of the Intrusion Detection system. We propose a Constructive Intrusion detection system based on the network and host based system. First of all it provided maximum security, it supports high scalability and high availability, and it provides best result on both normal and abnormal behaviors of different packets. The proposed model includes integration of individual model to produced batter results.

References
  1. Bo Sen, Kui Wu, vdo W. Pooch, “Zone-Based Intrusion Detection system for Mobile Ad Hoc Networks”, journal on Adhoc Networks in gurd conference, Vol.10, No. 7, pp 1178-1190, March 2010.
  2. Chundong Wang, Quancai Deng, Qing Chang,Hua
  3. Zhang and Huaibin Wang “A New Intrusion Detection
  4. System Based on Protocol Acknowledgement” IEEE
  5. 2010.
  6. Meng L, Dipala WS, Grimm WM, inventors; Robert Bosch GmbaH, assignee. Dual sensing intrusion method and system with state-level fusion. United States patent US 7,262,696. 2007
  7. Jin-Tae Oh, Sang-Kil Park, Jong-Soo Jang and Yong- Hee Jeon “Detection of DDoS and IDS Evasion
  8. Attacks in a High-Speed Networks Environment” published in IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.6, June 2007
  9. Ajay Prakash Rai, Vineet, Rinkoo Bhatia, “Wormhole Attack Detection in Mobile Ad Hoc Networks”, International Journal of Engineering and Innovative Technology, Vol.2, No. 3, pp 384-389, August 2012.
  10. Routing protocols and concepts, CCNA exploration companion guide. Introduction to AODV dynamic routing protocol. Chapter three, pp 148-177.
  11. Vera Marinova-Boncheva “A Short Survey of Intrusion Detection Systems” 2007
  12. Mod Alhamaety , Ali Yazdian “Intrusion Detection System Based On The Integrity of TCP Packet” published in World Academy of Science, Engineering and Technology 11 2007
  13. Loukas Lazos, and Marwan Krunz, “Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks” An International Journal on Engineering Science and Technology Arizona edu, Vol.2, No. 2, pp 265-269, April 2010.
  14. T. S. Sobhana “wireless intrusion detection system Classifications, good characteristics and state of- the-art”, Computer & Interfaces 30, pp. 670-694, Science Direct, 2006.
  15. D. H. Denning, "An intrusion-detection model." IEEE Transactions on Software Engineering, Vol. SE-13(No. 2):222-232, Feb. 1987.
  16. Douglas J. Brown, Billy Suckow, and Tianqiu Wang “A Survey of Intrusion Detection Systems” 2004
  17. Rajiv Ranjan, Naresh Trivedi and Anop Srivastava, “Mitigating of Blackhole Attack in Manets”, VSRD, International Journal of Computer Science and Information Tech., Vol.1, 53-57, 2011
  18. Maha Abdelhaq, Sami Serhan, Raed Alsaqour and Antoan Satrian, “Security Routing Mechanism for Black Hole Attack over AODV MANET Routing Protocol”, Australian Journal of Basic and Applied Sciences,5:1137-1145, 2011.
  19. Ekta Kamboj,Harshil Rohil, “Detection of Black Hole Attack on AODV using Fuzzy Logic”, Journal of Current Computer Science and Technology,Vol.1 Issue 6:316-318, 2011
  20. Mahesh Pal, “Multiclass Approaches for Support Vector Machine Based Land Cover Classification”, 2008.
  21. Preeti Nagrath,Ashish Kumar,Shikha Bhardwaj, “Authenticated Routing Protocol based on Reputation System For Adhoc Networks”, International Journal on Computer Science and Engineering, Vol.2: 3095-3099, 2010
  22. Adnan Nadeem, Michael P. Howarth,” A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE communications surveys & tutorials, Vol. 15, No. 4, Fifth quarter 2013
  23. Lung-Chung Li and Ru-Sheng Liua,” Securing Cluster-Based Ad Hoc Networks with Distributed Authorities”, IEEE transactions on wireless system, VOL. 9, NO. 10, pp-3072-3081, OCTOBER 2011
  24. N. Nasser and Y. Chen, “Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,” in Proc. IEEE Int.Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007
  25. Asma Tuteja, Rajneesh Gujral, Sunil Thalia, ―Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET using NS2‖, 2010 International Conference on Advances in Computer Engineering, 978-0-7695-4058-0/10 $26.00 © 2010 IEEE.
  26. Martin K Parmar, Harikrishna B Jethva, ―Survey on Mobile ADHOC Network and Security Attacks on Network Layer, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 11, November 2013.
  27. Vikas Makram and Shrish Mohan Duby, A General Study of Associations rule mining in Intrusion Detection System‖, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 3, January 2012.
  28. Peng Zhan, Xinyu Yang, Wei Yu sa, and Xinwen Fu,” A Loose Virtual Clustering Based Routing for Power Heterogeneous MANETs”, IEEE Transactions on vehicular technology, VOL. 62, NO. 5, JUNE 2013
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Network detection system Host based detection system.