CFP last date
20 May 2024
Reseach Article

Intrusion Detection System for Ad hoc Mobile Networks

by Muhammad Nawaz Khan, Muhammad Ilyas Khatak, Muhammad Faisal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 35 - Number 2
Year of Publication: 2011
Authors: Muhammad Nawaz Khan, Muhammad Ilyas Khatak, Muhammad Faisal
10.5120/4373-6036

Muhammad Nawaz Khan, Muhammad Ilyas Khatak, Muhammad Faisal . Intrusion Detection System for Ad hoc Mobile Networks. International Journal of Computer Applications. 35, 2 ( December 2011), 21-25. DOI=10.5120/4373-6036

@article{ 10.5120/4373-6036,
author = { Muhammad Nawaz Khan, Muhammad Ilyas Khatak, Muhammad Faisal },
title = { Intrusion Detection System for Ad hoc Mobile Networks },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 35 },
number = { 2 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume35/number2/4373-6036/ },
doi = { 10.5120/4373-6036 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:21:55.557736+05:30
%A Muhammad Nawaz Khan
%A Muhammad Ilyas Khatak
%A Muhammad Faisal
%T Intrusion Detection System for Ad hoc Mobile Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 35
%N 2
%P 21-25
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Proactive security mechanism like authentication, confidentiality and non-repudiation are difficult to implement in MANETs. Some additional security necessities are always desirable like co-operation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism (authentication, encryption) provide abstract level of security but some reactive security mechanism and deep level of inspection is always required. Here local-distributed intrusion detection system for ad hoc networks has proposed. In the proposed distributed-ID, a smart agent in each mobile node analyzes the routing packets and also checks the overall network behavior of MANETs. It works like a Client-Server model using Markov process. The proposed local distributed- IDS shows a balance between false positive and false negative rate.

References
  1. Poly Sen, Nabendu Chaki, Rituparna Chaki “HIDS: Honesty-rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks”.
  2. “Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness.” By Sonja Buchegger, Jean-Yves Le Boudec .
  3. M. Gasser, A. Goldstein, C. Kaufman, B. Lampson, “The Digital Distributed Systems Security Architecture,” 12th National Computer Security Conference.
  4. Wensheng Zhang, R. Rao, Guohong Cao, GeorgeKesidis “SECURE ROUTING IN ADHOC NETWORKS AND A RELATED INTRUSION DETECTION PROBLEM”.
  5. L. Zhouand Z. Haas, “Securing Ad Hoc Networks,” IEEE Net-work
  6. Frank Stajano and Ross Anderson. “The Resurrecting Duckling.” Lecture Notes in Computer Science, Springer-Verlag, 1999.
  7. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang. “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks.” In International Conference on Network Protocols (ICNP), pages 251–260, 2001
  8. Panagiotis Papadimitratos and Zygmunt J. Haas. “Secure Routing for Mobile Ad Hoc Networks” In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference. (CNDS 2002), San Antonio, TX, January 2002
  9. Yongguang Zhang and Wenke Le “ Intrusion Detection in Wireless Ad-Hoc Networks” In Proceedings of MOBICOM 2000
  10. Michael Healy, Thomas Newe, Elfed Lewis “Security for Wireless Sensor Networks: A Review” Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick, Ireland.(2009).
  11. Yi-an Huang, Wenke Lee. “ A Cooperative Intrusion Detection System for Ad Hoc Networks “.
  12. Ernesto Jiménez Caballero, “Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem”.
  13. Hua Zhou, Junlin Li, Na Zhao, Fei Dai and Rong Jiang. “An Intrusion Detection System Model for Ad Hoc Networks Based on the Adjacent Agent”. International Conference on Multi Media and Information Technology 2008.
  14. Yinghua Guo and Steven Gordon “Ranger, a Novel Intrusion Detection System Architecture for Mobile Ad Hoc Networks”.
  15. Yu Liu, Yang Li, Hong Man. “Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks”. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05) 2005 .
  16. Rakesh Shrestha, Jong-Yeop Sung, Sang-Duck Lee, Pyung Sik-Yun, Dong-You Choi and Seung-Jo Han. “A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network”. Pacific-Asia Conference on Circuits,Communications and System. 2009
  17. Muhammad Mahmudul Islam, Ronald Pose and Carlo Kopp. “An Intrusion Detection System for Suburban Ad hoc Networks”
  18. S.Bose and A.Kannan. “Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks”. IEEE-International Conference on Signal processing, Communications and Networking, Jan 4-6, 2008
  19. O. Kachirski and R. Guha, Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks, Knowledge, July 10–12, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Intrusion Detection System (IDS) security mechanism proactive reactive Markov process false negative and false positive