Open Access Open Access  Restricted Access Subscription or Fee Access

A Heuristic Profile Based Intruder Detection Scheme on MANET

T. Abdul Razak, R. Balasubramanian

Abstract


The major challenge in the design of MANETs is their vulnerability to security attacks. The rapid proliferation of multiple heterogeneous mobile / wireless networks and mobile computing applications attribute for the change in security architecture. The major obstacle for the detection of an internal intrusion is that the nodes are under consistent mobility. Nodes move constantly within the internal domain of MANET. In such cases, the traditional intrusion detection approach has to be allocated to several strategic points to identify an intrusion or attempted attack at the moment it occurs. A number of algorithms and schemes for detecting intruders in MANET exist, but all systems suffer from performance penalties and high false alarm rates. This research work concentrates on the development of an architectural model for identifying intruders using profile based anomaly or misuse detection mining approach. The proposed architecture aims to minimize the costs involved in monolithic intrusion detection and works on identifying intruders based on XML / ontology setup in mobile nodes. The model is simulated using ns2 simulator.

Keywords


Intrusion Detection, Wireless Networks, Profile, Mobile Ad Hoc Networks, AODV.

Full Text:

PDF

References


Ian D. Chakeres and Elizabeth M. Belding-Royer. "AODV Routing Protocol Implementation Design." Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN), Tokyo, Japan, March 2004.

Royer, E.M.; Perkins, C.E., “An implementation study of the AODV routing protocol”, Wireless Communications and Networking Conference (WCNC 2000), IEEE, Volume 3, Issue , pp. 1003 – 1008, 2000.

http://www.isi.edu/nsnam/ns/

J.P. Anderson, “Computer Security Threat Monitoring and Surveillance”. Technical Report, James P.Anderson Co., Fort Washington, PA, April 1980.

D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, Vol. 13, Issue 2, pp. 222-232, February 1987.

Yongguang Zhang, Wenke Lee, and Yian Huang. Intrusion Detection Techniques for Mobile Wireless Network, ACM/ Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, pp. 545-56, September 2003.

W. Lee, S. J. Stolfo, and K. W. Mok, “A Data Mining Framework for Building Intrusion Detection Models,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120-132, May 1999.

Yian Huang and Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), Fairfax, Virginia, October 2003.

Mishra, K. Nadkarni, and A. Patcha, Intrusion Detection in Wireless Ad Hoc Networks, IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, February 2004.

S. Marti, T. Giuli, K. Lai, and M.Baker, “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks”, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2000, Boston, MA, pp. 255-265. Aug 2000.

O. Kachirski, and R. Guha, “Intrusion Detection using Mobile Agents in Wireless Ad Hoc Networks,” Proceedings of IEEE Workshop on Knowledge Media Networking, pp. 153-158, 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.