A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks
نویسنده
چکیده
In wireless ad-hoc networks, the participating wireless stations use a routing protocol called as Dynamic Source Routing (DSR). Such networks are highly vulnerable to (packet) routing misbehavior which is generally due to malware, faulty or compromised stations. For such networks, the traditional way of implementing firewalls at switches, routers or gateways and encryption software are not sufficient and effective because the mobile ad-hoc environment does not have such traffic concentration points, thus requiring behavior monitoring of the individual stations. Intelligent machine learning techniques are therefore helpful for misbehavior detection that aims at keeping such vulnerable behavior under check. In this work, the use of an anomaly detection algorithm, inspired by biological immune systems in vertebrae, is investigated to detect such misbehaving nodes. This is a model based on behavior-based intrusion detection techniques which assume misbehavior identification by observing a deviation from normal or expected behavior, of the nodes’ protocol event sequence in wireless routing traffic. The objective is to build an effective technique, which like its natural counterpart, intelligently learns and detects unknown (and new) anomalous behavior with very low false positives. The solution for the classification task of normal versus abnormal will be employed using hybrid negative selection for learning and adaptation, used primarily by the natural immune system. To evaluate the performance of the proposed technique, a radio based wireless network is employed for the simulation experiments, namely GloMoSim. The system is designed to produce multi set detectors produced using monitored behavior of neighborhood nodes, which will eventually be distributed independently for each network node that can run different specialized detector set thus fortifying the overall strength of the active wireless nodes.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملAn Immuno-Inspired Approach to Misbehavior Detection in Ad Hoc Wireless Networks
We propose and evaluate an immuno-inspired approach to misbehavior detection in ad hoc wireless networks. Node misbehavior can be the result of an intrusion, or a software or hardware failure. Our approach is motivated by co-stimulatory signals present in the Biological immune system. The results show that co-stimulation in ad hoc wireless networks can both substantially improve energy efficien...
متن کاملBroadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach
While routing in multi-hop packet radio networks (static Ad-hoc wireless networks), it is crucial to minimize power consumption since nodes are powered by batteries of limited capacity and it is expensive to recharge the device. This paper studies the problem of broadcast routing in radio networks. Given a network with an identified source node, any broadcast routing is considered as a directed...
متن کاملSimulation of Misbehaviour Detection in Ad Hoc Wireless Networks
The goal was to test performance and suitability of Artificial immune systems for detecting misbehavior in ad hoc wireless networks. We have used a realistic simulation setup consisting of a medium sized ad hoc wireless network. Additionally, we have tested scalability of this approach using synthetic input sets.
متن کاملBeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کامل