CFP last date
20 May 2024
Reseach Article

Artificial Neural Network Based Misuse Detection in MANETs

Published on None 2011 by S. S. Manvi, M. S. Kakkasageri
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 15
None 2011
Authors: S. S. Manvi, M. S. Kakkasageri
34d03694-f472-4a1c-92e7-cd928006e161

S. S. Manvi, M. S. Kakkasageri . Artificial Neural Network Based Misuse Detection in MANETs. International Conference on VLSI, Communication & Instrumentation. ICVCI, 15 (None 2011), 30-34.

@article{
author = { S. S. Manvi, M. S. Kakkasageri },
title = { Artificial Neural Network Based Misuse Detection in MANETs },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 15 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 30-34 },
numpages = 5,
url = { /proceedings/icvci/number15/2745-1585/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A S. S. Manvi
%A M. S. Kakkasageri
%T Artificial Neural Network Based Misuse Detection in MANETs
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 15
%P 30-34
%D 2011
%I International Journal of Computer Applications
Abstract

A Mobile Ad-hoc network (MANET) is a multi-hop wireless network where nodes communicate with each other without any pre-deployed infrastructure. An attack is an attempt to bypass the security controls on a computer. The attack may alter, release, or deny data. Intrusion Detection System is a process of monitoring activities in a system, which can be a computer or network system. The mechanism by which this is achieved is called an intrusion detection system. Once an IDS determines that an unusual activity occurs, it then generates an alarm to alert the security administrator. This paper proposes an artificial neural network (ANN) method to find misuse detection in MANETs. Proposed method detects the attacks, corresponding to known pattern at the mobile nodes. At each mobile node whether the known attack is present or not is detected by comparing it with known patterns. These patterns are trained to ANN. Back propagation algorithm is used to train the network. To test the operative effectiveness of the proposed system, the proposed detection method is analyzed in terms of mean square error, number of iterations, computation path time taken to reach required accuracy, and change in learning rate parameter for various network scenarios.

References
  1. Jun-Zhao Sun, “Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing”. www.mediateam.oulu.fi/publications/pdf/92.pdf
  2. Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks”, ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol.9, No. 5, 2003.
  3. Christos Stergiou and Dimitrios Siganos, “Neural Networks”,http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html
  4. Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks”, ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol.9, No. 5, 2003.
  5. P. Albers, O. Camp, J. Percher, B. Jouga, L. M, and R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches”, Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 112, April 2002.
  6. O. Kachirski and R. Guha, \E®ective “Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks”, Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03),p. 57.1, January 2003.
  7. Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03), pp. 135-147, October 2003
  8. A.Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach”, Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA'04), pp. 343-346, 2004.
  9. S. Zhong, L. Li, Y. G. Liu and Y. Yang, “On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-hoc Networks: An Integrated Approach Using Game Theoretical and Cryptographic Techniques”, Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom'05), pp.117-131, 2005.
  10. H. Deng, W. Li, and Dharma P. Agrawal,"Routing Security in Ad Hoc Networks,” IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol.40, No. 10, October 2002
  11. C.-Y. T. et al., “A specification-based intrusion detection system for AODV,” in Proc. Of ACM Workshop on Security of ad hoc and sensor networks, 2003.
  12. Sarafijanovic, S. and Boudec, J., “An Artificial Immune System Approach with Secondary Response for Misbehavior Detection in Mobile Ad-Hoc Networks”. TechReport IC/2003/65, EPFL-DI-ICA, Lausanne, Switzerland, November 2003
  13. Panagiotis Papadimitratos and Zygmunt J. Haas “Secure Routing for Mobile Adhoc Networks”, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002.
  14. J. S. Balasubramaniyan et al., “An Architecture for Intrusion Detection using Autonomous Agents,” Proceedings of the Fourteenth Annual Computer Security Applications Conference, 1998.
  15. O. Kachirski and R. Guha, ”Effective Intrusion Detection using Multiple Sensors in Wireless Ad hoc Networks”, In Proc. 36th Annual Hawaii Int‟l. Conf. on System Sciences (HICSS‟03), pp.57.1, 2003.
  16. Y. Zhang and W. Lee. “Intrusion detection in wireless ad hoc networks”. In Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 275–283. ACM Press, 2000.
  17. A.Helmy, “Contact-extended zone-based transactions routing for energy-constrained wireless ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 54, no. 1, pp. 307–319,2005.
  18. H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, “Security in mobile ad hoc networks: Challenges and solutions”, IEEE Wireless Communications. 11 (1), pp. 38-47. 2004
  19. Yongguang Zhang, Wenke Lee and Yi-An Huang. “Intrusion Detection Techniques for Mobile Wireless Networks”. Wireless Networks, Volume 9 Issue 5, September 2003.
  20. Yuehui Chen and Ajith Abraham and Ju Yang, “Feature Deduction and Intrusion Detection Using Flexible Neural Trees”, Second IEEE International Symposium on Neural Networks (ISNN 2005), Lecture Notes in Computer Science Vol. 3498, J. Wang, X. Liao and Zhang Yi (Eds.) Springer Verlag, Germany, pp. 439 - 446, 2005.
  21. Yi-an Huang and Wenke Lee. “A Cooperative Intrusion Detection System for Ad Hoc Networks.” Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN‟03), October 2003.
  22. David Wagner and Drew, “Intrusion detection via Statistic Analysis”, IEEE Symposium on Security And Privacy, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network Intrusion detection system Artificial neural network Back propagation algorithm