CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach

by Saroj Hirnwal, Kirti Chauhan, Amit Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 8
Year of Publication: 2012
Authors: Saroj Hirnwal, Kirti Chauhan, Amit Gupta
10.5120/4629-6663

Saroj Hirnwal, Kirti Chauhan, Amit Gupta . Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach. International Journal of Computer Applications. 37, 8 ( January 2012), 22-27. DOI=10.5120/4629-6663

@article{ 10.5120/4629-6663,
author = { Saroj Hirnwal, Kirti Chauhan, Amit Gupta },
title = { Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 8 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number8/4629-6663/ },
doi = { 10.5120/4629-6663 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:11.756791+05:30
%A Saroj Hirnwal
%A Kirti Chauhan
%A Amit Gupta
%T Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 8
%P 22-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper ,we study the types of attacks in intrusion detection system in Mobile Ad Hoc network(MANET).Mobile Adhoc Networks are a relatively new and rapidly evolving area of interests. One such field concerns mobile adhoc networks (MANETs) in which mobile nodes organize themselves in a network without the help of any predefined infrastructure. Securing MANETs is an important part of deploying and utilizing them, since they are often used in critical applications where data and communications integrity in important. Many solution for intrusion detection in wireless environments have been developed but these solution may not always be sufficient, as ad-hoc networks have their own vulnerabilities that cannot be addressed by these solutions. In this paper traditional security algorithms coupled with intrusion detection mechanism. Here we using a quantitative method to detect intrusion in MANETS with mobile nodes. Our method is a behavioral anomaly based system, which makes it dynamic, scalable, configurable and robust. For simulating our mobile nodes use AODV (Adhoc on demand distance Vector)routing. It is observed that the malicious node detection rate is very good and false positive detection rate is slow.

References
  1. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Computer Networks, 38(4):393–427, 2002.
  2. Patrick Albers, Olivier Camp, Jean-Marc Percher1, Bernard Jouga, Ludovic Me, and Ricardo Puttini. Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. 2005.
  3. A.Rajaram and S.Palaniswami. A trust based cross layer security protocol for ad hoc networks. International Journal of Computer Science And Information Security, 6(1), 2009.
  4. F. Baker. An outsider’s view of manet. February 2002. http://tools.ietf.org/html/draftbaker- manet-review-00.
  5. Joo B. D. Cabrera, Raman K. Mehra, and Carlos Gutirrez. Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks.nternational Conference on Mobile Computing and Networks, 9(1), January 2008.
  6. Tracy Camp, Jeff Boleng, and Vanessa Davies. Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications. IEEE International Conference on Distributed Computing Systems, 2(5):483–502, September 2002.
  7. Zhijiang Chang, Georgi Gaydadjiev, and Stamatis Vassiliadis. Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation. Military Communications Conference, MILCOM, 1, 2002.
  8. Tao Li, Min Song, and Mansoor Alam. Compromized sensor node detection: A quantitative approach. IEEE International Conference on Distributed Computing Systems, pages 352–357, 2008.
  9. Dong Seong Kim, Khaja Mohammad Shazzad, and Jong Sou Park. A framework of survivability model for wireless sensor network. IEEE Proceedings of the First International Conference on Availability, Reliability and Security, February 2006.
  10. Amitabh Mishra, Ketan Nadkarni, and Animesh Patcha. Intrusion detection in wireless ad hoc networks. IEEE wireless communications, February 2004.
  11. A.B. Malany, V.R.S. Dhulipala, RM.Chandrasekaran, “Throughput and Delay Comparison of MANET Routing Protocols” Intl. Journal Open Problems Comp. Math., Vol. 2, No. 3, Sep 2009.
  12. D.O. Jörg, “Performance Comparison of MANET Routing Protocols In Different Network Sizes” Comp. Science Project, Institute of Comp. Science and Networks and Distributed Sys, University of Berne, Switzerland, 2003.
  13. A. Shrestha, F. Tekiner, “Investigation of MANET routing protocols for mobility and scalability” International Conference on Parallel and Distributed Computing, Applications and Technologies, Higashi Hiroshima, 2009.
  14. N. Qasim, F. Said, H. Aghvami, “Mobile Ad-Hoc Networks Simulations Using Routing Protocols for Performance Comparisons”, Proceedings of the World Congress on Engineering 2008, Vol 1, WCE 2008, UK, July, 2008.
  15. V.N. Talooki, K. Ziarati “Performance comparison of routing protocols for Mobile Ad-Hoc Networks”, Asia-Pacific conf. on Comm., APCC?06.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Intrusion Detection System Behavioral Anomaly Based System.