Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Detection System for Protection against Packet Dropping Attack on Distributed Information System in any Organization

K.P Singh, Yogesh Chaba, Gaurav Lodha, Yudhvir Singh


Intrusion detection is the method in which the events happening in a computer system or network are monitored and analyzed for signs of possible incidents, which may be threats of violation of information security policies or standard security practices. Intrusion prevention system makes an attempt to stop detected possible incidents which are threat to security. Intrusion detection and prevention system (IDPS) primarily focuses on detection and prevention of possible incidents which are threat to information security. In this paper a defence against packet dropping attack on Distributed Information System is designed in the form of Intrusion Detection System. Two techniques are implemented for prevention against selfish node intrusion: Enabling Broadcasting (EB) and Selective Multicast Addressing (SMA). EB is a cost-effective intrusion detection and prevention solution to the packet dropping using broadcasting method. The SMA is a solution that limits the number of active addresses flowing i.e. selective multicasting or selective multicast addressing, for an access link in order to find out multiple path for destination node. Performance is evaluated for different parameters and it is found that the proposed system of intrusion detection gives much better performance.


Broadcasting, IDS, Intrusion, Information, Security

Full Text:



“Intrusion detection system” Wikipedia - The Free Encyclopedia, Online: (2011)

Bace and Rebecca, “An Introduction to Intrusion Detection and Assessment: System and Network Security Management”. ICSA White paper, Vol 2, No. 9 (1998)

Zaman S, Karray F, “Lightweight IDS Based on Features Selection and IDS Classification Scheme”, Proc. International Conference Computational Science and Engineering CSE '09, Vol 3, pp. 365-369 (2009)

Roschke S, Feng Cheng, Meinel C, “An Extensible and Virtualization-Compatible IDS Management Architecture” Proc. 5th International Conference on Information Assurance and Security, Vol. 2, pp. 130-134 (2009)

Silva M, Lopes D, Abdelouahab Z, “A Remote IDS Based on Multi-Agent Systems, Web Services and MDA” Proc International Conference Software Engineering Advances, pp. 64-67 (2006)

Naveed M, Nihar S, Inayatullah Babar, “Network intrusion prevention by configuring ACLs on the routers, based on snort IDS alerts” Proc 6th International Conference Emerging Technologies (ICET), pp. 234 – 239 (2010).

Rao U.P, Sahani G.J., Patel D.R, “Machine learning proposed approach for detecting database intrusions in RBAC enabled databases” Proc. International Conference Computing Communication and Networking Technologies (ICCCNT), pp. 1-4, (2010)

Weijian Huang, Yan An, Wei Du, “A Multi-Agent-Based Distributed Intrusion Detection System” Proc. International Conference Advanced Computer Theory and Engineering (ICACTE), Vol. 3 pp. 141-143 (2010)

Xiaohong Qu, Zhijie Liu, Xiaoyao Xie, “Research on distributed intrusion detection system based on Protocol analysis” Proc. 3rd International Conference Anti-counterfeiting, Security, and Identification in Communication, pp. 421-424 (2009)


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.