CFP last date
20 May 2024
Reseach Article

Article:PROFIDES - Profile Based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network

by R.Saminathan, Dr.K.Selvakumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 14
Year of Publication: 2010
Authors: R.Saminathan, Dr.K.Selvakumar
10.5120/1329-1655

R.Saminathan, Dr.K.Selvakumar . Article:PROFIDES - Profile Based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network. International Journal of Computer Applications. 7, 14 ( October 2010), 21-26. DOI=10.5120/1329-1655

@article{ 10.5120/1329-1655,
author = { R.Saminathan, Dr.K.Selvakumar },
title = { Article:PROFIDES - Profile Based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 14 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number14/1329-1655/ },
doi = { 10.5120/1329-1655 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:18.134838+05:30
%A R.Saminathan
%A Dr.K.Selvakumar
%T Article:PROFIDES - Profile Based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 14
%P 21-26
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion Detection in MANET is one of the major concern in peer-to-peer networking scenario where mobile / wireless nodes communicate with each other without any pre-defined infra-structural setup. This paper presents an overview of various intrusion detection models, identifying its issues, discusses on design and proposes an intrusion detection system using profile based traffic behavior scenario (PROFIDES), to determine misbehaving nodes by generating alerts based on critical parameters to identify an intrusion activity. The proposed system had been checked primarily for Packet Drop attacks, where the performance is effective over AODV and its other counterpart protocols. PROFIDES works in highly dynamic varying environments where any variation in traffic intensity of MANET is analyzed to adapt for different traffic behavioral patterns.

References
  1. Ang, E. Z. "Node Misbehaviour in Mobile Ad Hoc Networks," National University of Singapore, 2004.
  2. Gionis , Afrati, H. Mannila. Approximating a collection of frequent sets. In Proc. of 2004 ACM Int. Conf. on Knowledge Discovery in Databases (KDD’04), pg 12 – 19, 2004.
  3. Michiardi.P and R. Molva, “CORE: A Collaborative Reputation mechanism to Enforce node cooperation in mobile ad hoc networks,” Communication and Multimedia Security Conference (CMS'02), September 2002.
  4. NS2 network simulator. http://www.isi.edu/nsnam/ns.
  5. Papadimitratos.P, Z. J. Haas, "Secure Routing for Mobile Ad hoc Networks", In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January. 2002.
  6. Perkins C.E, E.M. Royer, S.R. Das, “Ad hoc On-Demand Distance Vector Routing” draftietf-manet-aodv-08.txt, IETF MANET Working Group, June 1st, 2001.
  7. Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Proc. 6th annual International Conference on Mobile computing and Networking, U.S.A, 2006.
  8. Sterne.D, P. Balasubramanyam, et al. “A General Cooperative Intrusion Detection Architecture for MANETs”, Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, 2005
  9. Sun.B, Wu, U.W. Pooch, “Zone-based intrusion detection for mobile ad hoc”, International Journal of Ad Hoc & Sensor Wireless Networks, September 2004.
  10. Tung. A, J. Pei, Han, Fault-tolerant frequent pattern mining: Problems and challenges. In Proc. of 2001 ACM Int. Workshop Data Mining and Knowledge Discovery (DMKD’01), pages 7–12, 2001.
  11. Tseng, P et al, A specification based intrusion detection system for AODV, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 125–134. ACM Press, 2003
  12. Xiao et al, A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless/Mobile Network Security, pg 131-169, Vol No 6,2006
  13. Yi.S, P. Naldurg and R. Kravets, Security-Aware Ad-Hoc Routing for Wireless Networks, UIUCDCS-R-2001-2241 Technical Report, 2001
  14. Zhang.Y, W. Lee, and Y. Huang, “Intrusion detection techniques for mobile wireless networks,” Wireless Networks Journal (ACM WINET), vol. 9, no. 5, pp. 545-556, September 2003
  15. Zhang.Y, and W. Lee, “Intrusion detection in wireless ad-hoc networks,” in Proc. 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000, pp. 275–283.
  16. Zhou.L and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Misbehavior Traffic Intensity Threshold value Packet drop