Intrusion Detection System by Using Friends Algorithm

Authors

  • K.Thennarasu  Department of Computer Science and Engineering, Muthayammal Engineering College, Rasipuram, India
  • V. Karuppuchamy   Department of Computer Science and Engineering, Muthayammal Engineering College, Rasipuram, India

Keywords:

FACES, MANET, Dempster’s Shafer Theory

Abstract

Mobile Ad hoc Networks (MANETs) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most damages to MANET. Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad hoc mobile networks. The network is able to effectively isolate the malicious nodes in the ad hoc network. The information about the malicious nodes is gathered effectively by using Challenges. The drawback is that, the nodes are divided into friend list and question mark list. The question mark list nodes are not sure legitimate nodes. In my project, we propose a risk-aware response mechanism to the identify routing attacks. Our risk-aware approach is based on an Extended Dempster’s-Shafer mathematical theory of evidence introducing a notion of importance factors. Using Dempster’s Shafer Theory we can fix that the nodes are present in the question mark list are malicious nodes.

References

  1. S. Marti, T.J. Giuli, K.Lai and M. Baker, “Mitigating Routing  Misbehavior in Mobile Ad Hoc Networks”, Proc. International Conference on Mobile Computing and Networking, 2000, pp 255- 265.
  2. J. Clerk J.Joseph, A.Das, B.Seet and B.Lee, “CRADS: Integrated Cross Layer approach for Detecting Routing Attacks in MANETs”, Proc. IEEE Wireless Communication and Networking Conference (WCNC), 31st March -3rd April 2008.
  3. A.Nadeem and M.Howarth, “A Generalized Intrusion Detection and Prevention Mechanism for Securing MANETs”, Proc. IEEE International  Conference on Ultra Modern Telecommunications and Workshops, St Petersburg Russia 2009.
  4. T.Haniotakis, S. Tragoudas, and C. Kalapodas, “Security enhancement  through multiple path transmission in ad hoc networks,” in 2004 IEEE Int. Conf. Communications, Jun. 2004, vol. 7, pp. 4187–4191
  5. P. Narula, S. K. Dhurandher, S. Misra, and I.Woungang, “Security in mobile ad-hoc networks using soft encryption and trust based multipath Network  routing,” Sci. Direct Comput. Commun., 2008, vol. 31, pp. 760–769.
  6. H. Debar, M. Becker and D. Siboni, “A Neural Component for an Intrusion Detection System”, Proc. IEEE Computer Society Symposium on Security and Privacy, Oakland, May 1992.
  7. C.Piro, C.Shields and B.Levine, “Detecting the Sybil Attack in Mobile Ad hoc Networks”, Proc. IEEE International Conference on Security and privacy in Communication Networks, Aug-Sep. 2006.
  8. V. Frias-Martinez, S. J. Stolfo, and A. D. Keromytis, “BARTER:Behavior  Profile exchange for behavior-based admission and access control in  MANETs,” presented at the Proc. 5th Int. Conf. Information  Systems  Security, Kolkata, India, 2009, pp. 193–207.
  9. Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow, IEEE, Karan Verma,   Pushkar Gupta, and Pravina Dhurandher, “FACES: Friend  Based Ad Hoc  Routing Using Challenges to Establish Security in MANETs Systems”, IEEE systems journal, june 2011, vol. 5, no. 2.  
  10. Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu,”Risk Aware Mitigation for MANET Routing Attacks”,IEEE transactions on  dependable and secure computing, march/april 2012, vol. 9, no. 2.
  11. Adnan Nadeem ,Michael P.Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE communications surveys & tutorials, accepted for publication.
  12. Sanoop Mallissery, Jeevan Prabhu ,Raghavendra Ganiga, “Survey On Intrusion Detection Methods”, “Proc. Of Int. Con/, on Advances in Recent Technologies in Communication and Computing 2011”.
  13. Ye, N & Chen,Q., “An Anomaly Based on Chi – Square statistic for International Journal of Quality and Reliability Engineering, Vol 17, pp. 105-112, 2001.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
K.Thennarasu, V. Karuppuchamy , " Intrusion Detection System by Using Friends Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.851-857, March-April-2017.