Intrusion Detection System by Using Friends Algorithm
Keywords:
FACES, MANET, Dempster’s Shafer TheoryAbstract
Mobile Ad hoc Networks (MANETs) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most damages to MANET. Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad hoc mobile networks. The network is able to effectively isolate the malicious nodes in the ad hoc network. The information about the malicious nodes is gathered effectively by using Challenges. The drawback is that, the nodes are divided into friend list and question mark list. The question mark list nodes are not sure legitimate nodes. In my project, we propose a risk-aware response mechanism to the identify routing attacks. Our risk-aware approach is based on an Extended Dempster’s-Shafer mathematical theory of evidence introducing a notion of importance factors. Using Dempster’s Shafer Theory we can fix that the nodes are present in the question mark list are malicious nodes.
References
- S. Marti, T.J. Giuli, K.Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Proc. International Conference on Mobile Computing and Networking, 2000, pp 255- 265.
- J. Clerk J.Joseph, A.Das, B.Seet and B.Lee, “CRADS: Integrated Cross Layer approach for Detecting Routing Attacks in MANETs”, Proc. IEEE Wireless Communication and Networking Conference (WCNC), 31st March -3rd April 2008.
- A.Nadeem and M.Howarth, “A Generalized Intrusion Detection and Prevention Mechanism for Securing MANETs”, Proc. IEEE International Conference on Ultra Modern Telecommunications and Workshops, St Petersburg Russia 2009.
- T.Haniotakis, S. Tragoudas, and C. Kalapodas, “Security enhancement through multiple path transmission in ad hoc networks,” in 2004 IEEE Int. Conf. Communications, Jun. 2004, vol. 7, pp. 4187–4191
- P. Narula, S. K. Dhurandher, S. Misra, and I.Woungang, “Security in mobile ad-hoc networks using soft encryption and trust based multipath Network routing,” Sci. Direct Comput. Commun., 2008, vol. 31, pp. 760–769.
- H. Debar, M. Becker and D. Siboni, “A Neural Component for an Intrusion Detection System”, Proc. IEEE Computer Society Symposium on Security and Privacy, Oakland, May 1992.
- C.Piro, C.Shields and B.Levine, “Detecting the Sybil Attack in Mobile Ad hoc Networks”, Proc. IEEE International Conference on Security and privacy in Communication Networks, Aug-Sep. 2006.
- V. Frias-Martinez, S. J. Stolfo, and A. D. Keromytis, “BARTER:Behavior Profile exchange for behavior-based admission and access control in MANETs,” presented at the Proc. 5th Int. Conf. Information Systems Security, Kolkata, India, 2009, pp. 193–207.
- Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow, IEEE, Karan Verma, Pushkar Gupta, and Pravina Dhurandher, “FACES: Friend Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems”, IEEE systems journal, june 2011, vol. 5, no. 2.
- Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu,”Risk Aware Mitigation for MANET Routing Attacks”,IEEE transactions on dependable and secure computing, march/april 2012, vol. 9, no. 2.
- Adnan Nadeem ,Michael P.Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE communications surveys & tutorials, accepted for publication.
- Sanoop Mallissery, Jeevan Prabhu ,Raghavendra Ganiga, “Survey On Intrusion Detection Methods”, “Proc. Of Int. Con/, on Advances in Recent Technologies in Communication and Computing 2011”.
- Ye, N & Chen,Q., “An Anomaly Based on Chi – Square statistic for International Journal of Quality and Reliability Engineering, Vol 17, pp. 105-112, 2001.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.