CFP last date
20 June 2024
Reseach Article

A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network

by S.S.Chopade, N.N.Mhala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 6
Year of Publication: 2011
Authors: S.S.Chopade, N.N.Mhala
10.5120/2286-2968

S.S.Chopade, N.N.Mhala . A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network. International Journal of Computer Applications. 18, 6 ( March 2011), 34-39. DOI=10.5120/2286-2968

@article{ 10.5120/2286-2968,
author = { S.S.Chopade, N.N.Mhala },
title = { A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 6 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number6/2286-2968/ },
doi = { 10.5120/2286-2968 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:37.793971+05:30
%A S.S.Chopade
%A N.N.Mhala
%T A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 6
%P 34-39
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc networking has become an exciting and important technology in recent year because of the rapid proliferation of wireless devices. The security of data becomes more important with the increased use of commercial application over wireless network environments; there were several problems of security in wireless networks due to different types of attack and intruders. There were better methods an intruding handling procedure available for fixed networks. But it was difficult to analyze attacks in the mobile ad-hoc environments. The reason is that there is no central point to control all the activities in the network and dynamically changing network topology and behavior and limited power level of mobile devices. Attacks by intruders cause unauthorized use of wireless network so that the whole network will be suffered from packet loses. We are introducing three types of internal attack named as Node isolation, route disruption, Resource consumption; we presented an approach to handle such type of internal attacks for wireless network. We report our progress in developing intrusion detection capabilities for MANET. The proposed work can be performed by modifying ad-hoc on demand distance vector routing protocol. The simulation experiments are conducted on NS-2 environment in Linux platform.

References
  1. An Approach for detecting attacks in mobile adhoc networks”by V.Madhu Viswanatham and A.A.Chari,AP,India
  2. Yi-an Huang, Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), Fairfax, Virginia, October 31, 2003. Kashan Samad, Ejaz Ahmed, Waqar Mahmood, “Simplified Clustering Scheme for Intrusion Detection in Mobile Ad Hoc Networks”, 13th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, September 15-17, 2005.
  3. J. Wright, “Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection 2002 Nov 8 (Online Document)
  4. ‘A Co-operative Intrusion detection system for Ad-hoc Network’
  5. Peter Barron @ cs, tcd–ie, Stetan Weber, Siobhan Karke, and Vuinny Cahill. “Experiences Deploying an Ad-hoc Network in an Urban Environment” Stetan Weber 6) Yu-xi Lim, Tim Shemoyes, proceeding of the 2003 IEEE workshop on Information Assurance, Wireless Intrusion Detection and Response
  6. Air Defense Inc, “Wireless LANSecurity for the Enterprise” Air Defense. Available http://airdefense.net e
  7. Air Magnet, “Air Magnet” on 2003 jan 30 Available at http://www.airmagnet.net/11) Finisar “Surveyor Wireless” Finisar, cited 2003 jan 30 Available at: http://goninisar.com/index.html.
  8. Black Alchemy Enterprises, “Black Alchemy Weapons Lab: Fake AP”, Black Alchemy Enterprises. Cited2003Jan30)Availableat: http://blackalchemy.to/projects/fakeap/fake-ap.htmlJ.L.DeBoer, “Digital Matrix – AirSnare,” Digital Matrix. [online document] [cited 2003 Jan30 available at http://home.arrbi.com/~digital matrix/airsnare/
  9. S Barber. J. Chung, D. Dimdon, D. Lopes, B. McClintock, and D. Wang, “OpenAp,” [cited 2003 Jan30availableat HTTP:http://opensource.instant802.com/
  10. J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
  11. S. Basagni. Distributed clustering for ad hoc networks. In ISPAN-99, International Symposium on Parallel Architectures, Algorithms, and Networks, pages parth, Western Australia, June 1999.
  12. S. Basagni, K. Herrin, D. Bruschi, and E.Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.
Index Terms

Computer Science
Information Sciences

Keywords

MANET attacks Node isolation Route disruption Resource consumption