MANET: Detecting Critical Nodes for Intrusion Detection Systems

نویسندگان

  • Rubinder Kaur
  • Kestina Rai
  • Inderjeet
چکیده

Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained environment. Detecting malicious nodes in an open ad hoc network in which participating nodes have no previous security associations’ presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad hoc network does not have these types of network elements where the Intrusion Detection System (IDS) can collect and analyze audit data for the entire network. A number of neighbor monitoring, trust-building, and clusterbased voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad hoc networks. The resources consumed by ad hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. This paper presents a method for determining conditions under which critical nodes should be monitored, describes the details of a critical node test implementation, presents experimental results, and offers a new approach for conserving the limited resources of an ad hoc network IDS.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Determining Conditions for Monitoring of Critical Nodes for MANET Intrusion Detection System

In modern generation, the applications of MANET are increasing in use. But MANET are more vulnerable to many attacks because of their adhoc nature. The security issue is the main concern in the use of MANET application.Therefor, the selection of efficient methodologies and techniques to protect MANET is an important aspect. Detecting malicious nodes in an open adhoc network in which participati...

متن کامل

Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes

As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not en...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET

Adhoc networks uses mobile nodes to communicate among itself in which it does not have any fixed infrastructure like access point or base station. Due to dynamic network topology MANET security is a challenging task. Most of the routing protocols in MANET assumes a cooperative environment for communication. But, in the presence of malicious nodes, providing security to MANET is critical issue. ...

متن کامل

Survey on Network Based Intrusion Detection System in MANET

Mobile Ad hoc Network is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or indirectly. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of...

متن کامل

Intrusion Detection in MANET using Neural Networks and ZSBT

Mobile ad-hoc network is a collection of mobile nodes that organize themselves into a network without any predefined infrastructure. The characteristics of MANET are dynamic topology; bandwidth and energy constrained and limited physical security. Due to the dynamic nature of the network, these networks can be easily vulnerable to attacks. Many type of attacks can threat the MANET and the class...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007