Open Access Open Access  Restricted Access Subscription or Fee Access

Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection

S. Arul, S. Ravi

Abstract


A security mechanism is defined as the protection of systems against threats to confidentiality, integrity and availability. An intrusion is defined as any location of action that crack to negotiation the reliability, confidentiality and availability of a source. The procedure of monitoring the events occurring in a system/network and analyze for sign of intrusions. In this study, a generic framework for tracking the IP address of the nodes connected to a server and subsequently identifying the hostname and perform intrusion detection is presented. The techniques proposed energy aware routing schemes and ease congestion by recovering the time slots from „non-alive‟ nodes and allocate it to alive nodes in every iteration. In this paper, the results section is used for the testing and different IP nodes connected within an individual range is followed. The entire study is done using Network Emulator tool.

Keywords


Intrusion Detection, Dynamic Information Flow Tracking, Hostname Detection, Slotted Time Communication

Full Text:

PDF

References


Min Sheng, Jiandong Li and Yan Shi, “Critical Nodes Detection in Mobile Ad-hoc Network”, proceedings of the 20th International

Conference on Advanced Information Networking and Applications (AINA‟06), IEEE Tranactions, 2006.

Michaël Hauspie, “Localized Algorithms for Detection of Critical Nodes and Links for Connectivity in Ad hoc Networks”, proceeding in 3rd IFIP Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET 2004), Bodrum, Turkey”, 2004.

Andrew R. Cormier, Carl B. Dietrich, Jeremy Price, Jeffrey H. Reed, “Dynamic reconfiguration of software defined radios using standard architectures”, Physical Communication 3, pp. 73-80, 2010.

Anh Thien Tran, Dean Nguyen Truong and Bevan Baas, “A Reconfigurable Source-Synchronous On-Chip Network for GALS Many-Core Platforms”, IEEE Transactions on Computer-Aided Design Of Integrated Circuits and Systems, Vol. 29, No. 6, June 2010.

E. Beigne, F. Clermidy, H. Lhermet, S. Miermont, Y. Thonnart, X.-T. Tran, A. Valentian, D. Varreau, P. Vivet, X. Popon, and H. Lebreton, “An asynchronous power aware and adaptive NoC based circuit”, IEEE J. Solid-State Circuits, vol. 44, no. 4, pp. 1167–1177, Apr. 2009.

P. Teehan, G. G. F. Lemieux and M. R. Greenstreet, “Estimating reliability and throughput of source-synchronous wave-pipelined interconnect”, in Proc. ACM/IEEE International Symposium Network Chip (NOCS), pp. 234–243, May 2009.

X. Xiang, X. Wang and Y. Yang, “Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks”, IEEE Transactions On Mobile Computing, Vol. 10, No. 5, April 2011.

J. H. Sarker, M. Hassan, S. Halme, “Power level selection schemes to improve throughput and stability of slotted ALOHA under heavy load”, Computer Communication 25, 2002.

Luca Benini, Giovanni De Micheli, “Networks on Chips: A New SoC Paradigm”, in IEEE Transactions, 2002.

Shaomeng Li, “Exploiting Reconfigurable Hardware for Network Security”, in proceeding of 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines(FCCM'03), 2003.

Wagner, D. and Soto, P., “Intrusion detection: Mimicry attacks on host-based intrusion detection systems”, in proceedings of the 9th ACM conference on Computer and Communications Security, November, 2002.

Zanero, S., Savaresi, S.M., “Unsupervised learning techniques for an intrusion detection system.” in proceedings of the ACM Symposium on Applied Computing, March, 2004.

Min Sheng, Jiandong Li and Yan Shi, “Critical Nodes Detection in Mobile Ad Hoc Network”, proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA‟06), 2006.

Olatunji Ruwase, Phillip B. Gibbons, Todd C. Mowry, Vijaya Ramachandran, Shimin Chen, Michael Kozuch, Michael Ryan, “Parallelizing Dynamic Information Flow Tracking”, SPAA‟08, Munich, Germany, June 14–16, 2008.

G. Edward Suh, Jae W. Lee, David Zhang, Srinivas Devadas, “Secure Program Execution via Dynamic Information Flow Tracking”, ASPLOS‟04, Boston, Massachusetts, USA, October 7–13, 2004.

Yoshifumi Sakamoto, Kouichi Ono, Takeo Nakada, Yousuke Kubo and Hiroto Yasuura, “System-Level Energy Estimation for SoC based on the Dynamic Behavior of Embedded Software”, World Academy of Science, Engineering and Technology 59, 2011.

S. Gajek, A.-R. Sadeghi, C. Stueble and M. Winandy, “Compartmented security for browsers – or how to thwart a phisher with trusted computing”, in proceedings of the 2nd International Conference on Availability, Reliability and Security, Vienna, Austria, April 2007.

M. Gokhale, “Granidt: Towards Gigabit Rate Network Intrusion Detection Technology”, in Proceeding of 12th International Conference, FPL2002, France, Los Alamos National Laboratory, 2002.

M. Anand, Dr. S. Ravi, Kuldeep Chouhan, Syed Musthak Ahmed, “Context Switching Semaphore with Data Security Issues using Self-healing Approach”, International Journal of Advanced Computer Science and Applications, Vol. 2, No. 6, 2011.

J. Newsome and D. Song, “Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software”, in proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), February 2005.

Jeongmin Park, Joonhoon Lee, Hyunsang Youn, and Eunseok Lee, “Approach To Determining An External Problem For Self-Healing”, in Special Issue on Ubiquitous Computing Security Systems, Vol. 4, pp. 670-676, 2007.

T.A. Ramesh Kumaar and Dr. I.A.Chidambaram, “Self-Healing Strategy for Dynamic Security Assessment and Power System Restoration”,International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004), Vol. 2, Issue 2, April 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.