a new intrusion detection system to deal with black hole attacks in mobile ad hoc networks
نویسندگان
چکیده
by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attacks. for example in black hole attack, an attacker catches packets and throw them away, instead of forwarding them to their destinations. by using wireless intrusion detection systems, wireless networks can be protected. in this study, we introduce a new intrusion detection system to encounter black hole attack. this system is based on a combination of anomaly based intrusion detection (abid) and specification based intrusion detection (sbid), we also use a new intrusion response. the analysis of simulation results (with ns-2) show that our method is success by using three measures: throughput, packet loss rate and packet delivery rate in comparing with abid and sbid.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملIntrusion detection in mobile ad hoc networks
In recent years mobile ad hoc networks (MANETs) have become a very popular research topic. By providing communications in the absence of a fixed infrastructure MANETs are an attractive technology for many applications such as rescue operations, tactical operations, environmental monitoring, conferences, and the like. However, this flexibility introduces new security risks. Since prevention tech...
متن کاملDetection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
A Mobile Ad hoc Network (MANET) is a collection of wireless computers (nodes) communicating over multihop paths, without infrastructures such as base stations and access points. Nodes must cooperate to provide necessary network functionalities. The Dynamic Source Routing (DSR) protocol is a principal routing protocol in MANET, where security can be compromised by a “Black Hole” attack. In this ...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
journal of computer and roboticsجلد ۶، شماره ۲، صفحات ۷-۱۴
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023