CFP last date
20 May 2024
Reseach Article

Baids: Detection of Blackhole Attack in Manet by Specialized Mobile Agent

by Debdutta Barman Roy, Rituparna Chaki
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 13
Year of Publication: 2012
Authors: Debdutta Barman Roy, Rituparna Chaki
10.5120/5037-7355

Debdutta Barman Roy, Rituparna Chaki . Baids: Detection of Blackhole Attack in Manet by Specialized Mobile Agent. International Journal of Computer Applications. 40, 13 ( February 2012), 1-6. DOI=10.5120/5037-7355

@article{ 10.5120/5037-7355,
author = { Debdutta Barman Roy, Rituparna Chaki },
title = { Baids: Detection of Blackhole Attack in Manet by Specialized Mobile Agent },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 13 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number13/5037-7355/ },
doi = { 10.5120/5037-7355 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:27:56.888799+05:30
%A Debdutta Barman Roy
%A Rituparna Chaki
%T Baids: Detection of Blackhole Attack in Manet by Specialized Mobile Agent
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 13
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The inbuilt flexibility along with easy set-up and low maintenance cost causes MANETs to be increasingly useful in catastrophe management, battlefield surveillance; etc. The infrastructure-less performance of MANET has made it more vulnerable to intrusion than ever before making the security of network all the more acute. As the previously used security systems fail to protect the MANET from insider attacks, the need for an Intrusion Detection System (IDS) becomes evident. IDS based on Mobile Agents is long been used for securing the MANET. The prior works seem to suffer from computational overhead leading to performance. This paper proposes a mobile agent based IDS in order to reduce the overheads. The use of distributed ID consists of multiple mobile agents which assist over a large network and to make communication with each other, or with a central server that provide advanced network monitoring, incident analysis, and instant attack data. This as a whole reduces the network bandwidth usage by moving data analysis computation to the place of the intrusion data & sustains on the heterogeneous platforms.

References
  1. Debdutta Barman Roy, Rituparna Chaki “MADSN: Mobile Agent Based Detection of Selfish Node in MANET”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 4, August 2011
  2. Debdutta Barman Roy, Rituparna Chaki,Nabendu Chaki”a new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks “,International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009
  3. Chaki, Rituparna; Chaki, Nabendu; "IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network"; Proc. of the 6th Int’l Conf. on Computer Information Systems and Industrial Manage-ment Applications (CISIM '07); pp. 179 - 184, ISBN: 0-7695-2894-5, June 2007
  4. Yang, H. and Luo, H. and Ye, F. and Lu, S. and Zhang, U.; “Security in Mobile Ad Hoc Networks: Challenges and Solutions”; Wireless Communications, IEEE, vol. 11, num. 1, pp. 38-47, 2004
  5. Y.-C. Hu, A. Perrig; “A Survey of Secure Wireless Ad Hoc Routing”; Security and Privacy Magazine, IEEE, vol. 2, issue 3, pp. 28-39, May 2004.
  6. Y.-C. Hu, A. Perrig, D. B. Johnson; “Wormhole At tacks in Wireless Networks”; IEEE Journal on Select ed Areas of Communications, vol. 24, numb. 2, pp. 370- 380,2006
  7. Y.-C. Hu, A. Perrig, D. B. Johnson; “Packet leashes: defense against wormhole attacks in wireless networks”; INFOCOM 2003, Twenty-Second Annual Joint Confe-rence of the IEEE Computer and Communication Socie-ties, Vol. 3, pp.1976-1986, 2003
  8. Saidat Adebukola Onashoga, Adebayo D. Akinde, and Adesina Simon Sodiya” A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems”, Is-sues in Informing Science and Information Technology Volume 6, 2009
  9. Abraham, A., Jain, R., Thomas, J., & Han, S. Y. “. D-SCIDS: Distributed soft computing intrusion de-tection system”. Journal of Network and Compute Application, 30,pp 81- 98,2007
  10. Adesina Simon Sodiya” Multi-level and Secured Agent-based Intrusion Detection System”, Journal of Computing and Information Technology - CIT 14, 3, 217–223 doi:10.2498/cit.2006.03.05
  11. H.Q. Wang, Q.Wang, Q. Zhao, G.F.Wang, R.J.Zheng and D.X.Liu “Mobile Gent for Network Intrusion Reistance” , Advance Web and Network Technology and Applications Lecture notes in Computer Sci ence,vol. 3842/2006. 965- 970 ,2006
  12. Eid, M., Artail, H., Kayssi, A., & Chehab, A. “ An adaptive intrusion detection and defense system based on mobile agents Innovations in Information Technologies (IIT’2004)
  13. Li, C., Song, Q., & Zhang, C.” MA-IDS: Architecture For distributed intrusion detection using mobile agents”. 2nd International Conference on Information Technology for Application (ICITA, 2004).
  14. Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris “Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks”, Ayia Napa, Cyprus, July 6-7, 2006
Index Terms

Computer Science
Information Sciences

Keywords

MANET BLACK HOLE MOBILE AGENT