Open Access Open Access  Restricted Access Subscription or Fee Access

A New Intelligent Reputation Based Mobile Intrusion Detection System using a Recovery Protocol

Dr.S. Madhavi, Dr. Tai Hoon Kim

Abstract


Due to the dynamic nature, lack of centralized control and shared channel, the mobile adhoc networks demands an intrusion detection system suitable for the MAC layer. Many anomaly based mobile intrusion detection systems are given but they could not provide 100% detection rates and perfect false positive rates. Also it is difficult to train the network with all possible attacks. Hence the main aim of this paper is to protect the users data from the damage caused due to the malicious activities and also call dynamic agents. The responsibility of these agents is to identify any unknown attacks and update the intrusion detection system with the unknown attack along with its features. Hence in this paper which is a sequence paper to our earlier mIDS, IRmIDS, we modified our Intelligent Distributed Reputation based Mobile Intrusion Detection System to include dynamic agents and recovery protocol.

Keywords


MAC, SOM, DoS, U2R, IDS, IRmIDS.

Full Text:

PDF

References


S.Madhavi and I.Ramesh Babu “Security for Mobile Adhoc Networks Challenges and Solutions”, in Journal of Computer Science , Karpagam, Sept-Oct 2007 Vol 1 Issue 6.

S.Madhavi and Tai-hoon Kim “ An Intrusion Detecting System in Mobile AdHoc Netwoks” in International Journal of Security and its Applications Vol. 2, No.3, July 2008.

S.Madhavi “An Intrusion Detecting System for Mobile AdHoc Networks “indexed in IEEE Digital Xplore conference proceedings of ISA April 2008.

S.Madhavi and Lakshmi “Anti-Phishing System to Detect Phishing Web Pages with Visual Similarity Assessment “ , in International Journal on Computer Engg & Information Technology (IJCEIT) ISSN 0974-2034 March 2009- May 2009 PP3-21 Vol 3 No 4.

S.Madhavi and I.Ramesh Babu “ Maximizing the Throughput in Mobile Adhoc Networks using an mIDS“,in International Journal CIIT , in Nov 2009

S.Madhavi , Tai-hoon Kim , Julian Dermoudy and Byeong-Ho KANG “A Reputation Intrusion Detection system in Mobile Adhoc Networks using a Set Based Election Monitior Protocol“ , in Masaum International Journal of computing ; Vol 1 No 1 August 2009

S.Madhavi and Vijaya , “Authentication of People Based on Typing Pattern with Artificial neural Networks “ ,in International Journal on Computer Engineering and Information Technology (IJCEIT) ISSN 0974-2034 March 2009-May 2009 PP 94-101 Vol 5 No 8

S.Madhavi and I.Ramesh Babu ,“Performance analysis of mIDS” , in Acharya Nagarjuna University International Journal of Engineering & Technology Vol 1 No 1 June 2010 PP 1-7

S.Madhavi, “Long Term Security for Signed Documents”, in the Proceedings of NEXTGENERATION IT , an International Conference , at Sri Satya SaiBaba Institute at Prasanthi Nilayam Ananthapur, 2006.

S.Madhavi and Dr.Tai-honn Kim , “An Intelligent Reputation Based Mobile Intrusion Detection system”, IJCST . Pages 53-58 Vol 2 Issue 7 Oct 2011.

S.Madhavi, “A new Intrusion Detection System for Mobile Adhoc Networks” , in the Proceedings of a National Conference organized by V.R. Siddhartha College of Engineering, 2007.

S.Madhavi, “Security for Mobile Adhoc Networks: Challenges and Solutions”, in the proceedings of a National Conference organized by V.R. Siddhartha College of Engineering, 2007.

Y. Zhang and W. Lee and Y. Huang. Intrusion detection techniques for mobile wireless networks. In ACM/Kluwer Mobile Networks and Applications (MONET), volume 8, pages 545– 556, Sep 2003

Kashan Samad, Ejaz Ahmed, Waqar Mahmood, “Simplified Clustering Scheme for Intrusion Detection in Mobile Ad Hoc Networks”, 13th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, September 15-17, 2005.

AikateriniMitrokotsa, Rosa Mavropodi, Christos Douligeris , “Intrusion Detection of Packet Dropping Attacks inMobile Ad Hoc Networks” , International Conference on Intelligent Systems And Computing: Theory And Applications, Ayia Napa, Cyprus, July 6-7, 2006

H. Yang, X. Meng, and S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,” ACM Wise, 2002.

J. Kong et al., “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” IEEE ICNP, 2001.

K. BAL Krishnan, J. Deng, P. K. Varhney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In IEEE WCNC, Mar 2005.

Yi-an Huang, Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), Fairfax, Virginia, October 31, 2003.


Refbacks

  • There are currently no refbacks.