CFP last date
20 May 2024
Reseach Article

Hybrid Approach: Detection of Intrusion in Manet

Published on September 2011 by Rubana Tarannum, Megha Lamble
Innovative Conference on Embedded Systems, Mobile Communication and Computing
Foundation of Computer Science USA
ICEMC2 - Number 1
September 2011
Authors: Rubana Tarannum, Megha Lamble
cd9b93bb-f3a4-4d37-a695-344d432ed67f

Rubana Tarannum, Megha Lamble . Hybrid Approach: Detection of Intrusion in Manet. Innovative Conference on Embedded Systems, Mobile Communication and Computing. ICEMC2, 1 (September 2011), 24-28.

@article{
author = { Rubana Tarannum, Megha Lamble },
title = { Hybrid Approach: Detection of Intrusion in Manet },
journal = { Innovative Conference on Embedded Systems, Mobile Communication and Computing },
issue_date = { September 2011 },
volume = { ICEMC2 },
number = { 1 },
month = { September },
year = { 2011 },
issn = 0975-8887,
pages = { 24-28 },
numpages = 5,
url = { /proceedings/icemc2/number1/3522-icemc006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Innovative Conference on Embedded Systems, Mobile Communication and Computing
%A Rubana Tarannum
%A Megha Lamble
%T Hybrid Approach: Detection of Intrusion in Manet
%J Innovative Conference on Embedded Systems, Mobile Communication and Computing
%@ 0975-8887
%V ICEMC2
%N 1
%P 24-28
%D 2011
%I International Journal of Computer Applications
Abstract

As the progression of networks is continues, Mobile ad hoc network (MANET) has become as a new frontier of technology to give anywhere, anytime communication. Because of the features like unreliability of wireless links between nodes, dynamic topology, limited battery power, lack of centralized control and others, the mobile ad hoc networks are more vulnerable to suffer from the malicious behaviors than the traditional wired networks. The topology of an ad hoc network is defined by the geographical positions and the transmission ranges of the nodes. The Prevention methods like , Firewalls , authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this paper we have discussed an Intrusion detection system for Mobile Ad-hoc Networks using a hybrid approach which consists of local as well as global detection using reactive and proactive protocols.

References
  1. Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer, "An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks," acsac, pp.16-27, 20th Annual Computer Security Applications Conference (ACSAC'04), 2004.
  2. G. S. Mamatha1 and Dr. S. C. Sharma2“A New Combination Approach To SecureMANETS Against Attacks”International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010.
  3. Foong Heng Wai, Yin Nwe Aye, Ng Hian James” Intrusion Detection in Wireless Ad-Hoc Networks” CS4274 introduction to mobile computing.
  4. Sunita Sahu1 & Shishir K. Shandilya2” A Comprehensive Survey On Intrusion Detection In Manet” International Journal of Information Technology and Knowledge ManagementJuly-December 2010, Volume 2, No. 2, pp. 305-310
  5. Dorothy E. Denning "An Intrusion-detection Model” IEEE Transaction on Software Engineering, 13, No. 7, Pp 222-232, Feb 1987.
  6. H.–Y. Chang, S.F. Wu and Y.F. Jou, “Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks”, ACM Tran. Inf. Sys.Sec., 1, Pp. 1-36, 2001.
  7. O. Kachirski , R. Guha “Effective Intrusion Detection using Multiple Sensors In Wireless Adhoc Networks” HICSS’03, PP 57-64, 2003.
  8. D. Sterne1, P. Balasubramanyam2, D. Carman1, B. Wilson1, R. Talpade3, C. Ko1,R. Balupari1, C-Y. Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 "A General Cooperative Intrusion Detection Architecture for MANETs”. June 21, 2006 .
  9. Ioanna Stamouli, Patroklos G. Argyroudis, and Hitesh Tewari "Real-time Intrusion Detection for Ad hoc Networks” Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM’05), 0-7695-2342-0/05 $20.00 © 2005 IEEE.
  10. S.Bose,P.Yogesh and A.Kannan “Neural Network Approach for Anomaly Intrusion Detection in Adhoc Networks using Agents” Internatinal Journal of Soft computing1, Medwell Online 2006.
  11. Xia Wang ” Intrusion Detection Techniques in Wireless Ad Hoc Networks”.- 30th COMPSAS 06- 0-7695-2655-1/06.
  12. Yu Liu, Cristina Comaniciu and Hong Man "A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks. – ICC-06, IEEE International Conference, June 2006, PP 2201.
  13. Ningrinla Marching and Raja Datta "Collaborative Technique for Intrusion Detection in Mobile Ad hoc Network” Ad hoc Networks, 6, Issue 4, June 2008 Page 508-523.
  14. Pasquale Donadio, Antonio Cimmino and Giorgio Ventre “Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid Based Agnostic Middleware”.- AUPC’08, 2nd International Workshop ACM-2008.
  15. S.Madhavi and Dr. Tai Hoon Kim “An Intrusion Detection System in Mobile Ad hoc Networks” International Journal of Security and its Application, 2, No 3, July 2008.
  16. S.Sen and John Andrew Clark “A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks” March 2009, WiSec ’09: Proceedings of the Second ACM Conference on Wireless Network Security.
  17. Yinan Li, Zhihong Qian –“Mobile agents-based intrusion detection system for mobile adhoc network” , PP- 145, 30,31 Jan, 2010 (ICCC-ITOE) .
  18. NS-2 Simulator. URL: http://www.isi.edu/nsnam/ns.
  19. Y.-C. Hu, A. Perrig, “A survey of secure wireless ad hoc routing”, IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 28-39, May-June 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Network Security attacks Intrusion Detection local global reactive proactive hybrid