Open Access Open Access  Restricted Access Subscription or Fee Access

Agent Based Dynamic Anomaly Intrusion Detection in MANET

M. Dheenadhayalan, J. Mannar Mannan, M. Sundarambal

Abstract


Wireless ad hoc networks susceptible to intrusions as they operate in an open medium and use co-operative strategies for network communications. Solutions that are designed for wired networks are not always suitable for wireless networks, especially Mobile Ad Hoc Networks (MANET) are in Dynamic nature. To obtain an acceptable level of security for MANET’s, Traditional security solutions like Agent (mobile agent) based are combined with intrusion detection mechanisms. One method is to have IDS is running on every mobile host in a network, which runs a local detection engine analyzing local data for anomalies. A cooperative detection mechanism decides whether there is an intrusion, with all nodes taking part in the decision process related agent. But MANET nodes typically limited battery power. Thus it is not efficient to make each MANET node always a monitoring node, especially when the threat level is low. Instead a cluster of neighboring MANET nodes can randomly and fairly elect a monitoring node use agent and the cluster head. If a compromised node happens to be selected as the cluster head, it can launch attacks without being detected. The cluster head selection based on the fitness function based. The higher fitness function value take the monitoring the nodes of others in the cluster network.

Keywords


Mobile Ad Hoc Network (MANET), Cluster Head, Mobile Agent, and Fitness Function, Intrusion Detection.

Full Text:

PDF

References


A.Mishra, K.Nadkarni, and A.Patcha, “Intrusion detection in wireless ad hoc networks”, IEEE Wireless Commun., vol.11, no.1, pp.48-60, Feb.2004.

M.Chatterjee, S.K. Das and D.Turgut, 2002. WCA: A Weighted Clustering Algorithm (WCA) for mobile ad hoc networks. Cluster Compute, vol.5, pp.193-204.

L.Chambers, Practical Handbook of Genetic algorithm application, vol.1, CRC Press, 1995.

Er, I.I, and W.K.G.Seah, “Mobility Based d-hop clustering algorithm for mobile ad hoc networks”, IEEE Wireless Commun, Networking Conf., vol.4, pp.2359-2364.

B.Sun, K.Wu, and U.Pooch, “Towards adaptive intrusion detection in mobile ad hoc networks”, in proc.IEEE Global Telecommunm. Conf GLOBECOM, NOV./DEC. 2004, PP.3551-3555.

R.Nakkeeran, T.Aruldoss Albert, and R.Ezumalai,“Agent based efficient anomaly intrusion detection in ad hoc networks”, IACSIT, vol.2, no.1, Feb.10.

Yia-an Huang, W.Enke Lee, “A Cooperative intrusion detection system for ad hoc networks”, ACM Workshop on security of ad hoc and sensor networks, 2003, pp.135-147.

Hang Yu Yang, Li-Xia Xie, “Agent based intrusion Detection for a Wireless Local Area Network”, Proceedings of the IEEE third international Conference on Machine Learning and Cybermatics, 2004, pp. 2640-2643.

D.Turgut, S.K. Das, R.Elmasri and B.Turgut, 2002. “Optimizing clustering algorithm in mobile ad hoc networks using genetic algorithm approach”, IEEE Global Telecommunications Conference. GLOBECOM Apos, 2002, pp. 62-66.

P.Argyroudis and D.O’Mahony, “Secure routing for mobile ad hoc networks, ”Commun. Surveys Tuts, vol.7, no.3, pp.2-21, Third Quarter, 2005.

J.F.Sharmila, B.R.Elijah, “Performance analysis of clustering protocols in mobile ad hoc networks, Computer Science, 2008, pp.192-204.

R.Heady,G.Luger,A.Maccabe and M.Servilla, The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico(August 1990).

B.Mukherjee, L.Todd Heberlein, and Karl N.Levitt, Network Intrusion Detection, IEEE Network, May/June 1994.

R.Janakiraman, M.Waldvogel, and Qi Zhang. Indra: a peer-to-peer approach to network intrusion detection and prevention, Twelfth IEEE International Workshops, Jun 9-11, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.