IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET151531                                                     

Intrusion Detection Techniques in Mobile Adhoc Networks Simulators from Attackers


Ch. Kedari Rao, V. Pragathi, K. Yamini
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Several Intrusion Detection Techniques (IDTs) projected for mobile unexpected networks suppose every node passively watching the info forwarding by its next hop. This paper presents quantitative evaluations of false positives and their impact on watching based mostly intrusion detection for unexpected networks. Experimental results show that, even for a straightforward three-node configuration, associate actual adhoc network suffers from high false positives; these results area unit valid by mathematician and probabilistic models. However, this false positive downside can't be determined by simulating constant network mistreatment common unexpected network simulators, like ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model is enforced within the Glomosim machine. With this revised noise model, the simulated network exhibits the combination false positive behavior just like that of the experimental testbed. Simulations of larger (50-node) unexpected networks indicate that monitoring-based intrusion detection has terribly high false positives. These false positives will scale back the network performance or increase the overhead. in a very easy monitoring-based system wherever no secondary and additional correct strategies area unit used, the false positives impact the network performance in 2 ways: reduced turnout in traditional networks while not attackers and inability to mitigate the impact of attacks in networks with attackers.

Ch. Kedari Rao, V. Pragathi, K. Yamini

Intrusion detection techniques, mobile unexpected networks, Adhoc network simulators, OPNET, Attackers.

  1. Cisco Systems Inc., Linksys WRT54G v2.2 Wireless-G Broadband Router, http://www.linksys.com, 2004.
  2. L. Eschenauer, V.D. Gligor, and J. Baras, "On Trust Establishment in Mobile Ad-Hoc Networks," Proc. Security Protocols, pp. 47-66, 2003.
  3. J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Dept. of Computer Science, Florida State Univ., 2005.
  4. R. Jain, The Art of Computer Systems Performance Analysis:Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley & Sons, 1991.
  5. M.R. Leadbetter, G. Lindgreen, and H. Rootze, Extremes and Related Properties of Random Sequences and Processes. Springer-Verlag, 1983.
  6. H. Lee, A. Cerpa, and P. Levis, "Improving Wireless Simulation through Noise Modeling," Proc. ACM Int'l Conf. Information Processing in Sensor Networks (IPSN '07), pp. 21-30, Apr. 2007.
  7. K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgement Based Approach for Detection of Routing Misbehavior in Manets," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
  8. K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
  9. Z. Liu, A. Joy, and R. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04), pp. 80-85,2004.
  10. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-Securing Ad Hoc Wireless Networks," Proc. Seventh IEEE Symp. Computers and Comm. (ISCC '02), 2002.
  11. S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom,pp. 255-265, Aug. 2000.
  12. R. Molva and P. Michiardi, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP Comm. and Multimedia Security Conf., 2002.
  13. X. Su and R.V. Boppana, "On the Impact of Noise on Mobile Ad Hoc Networks," Proc. ACM Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC '07), pp. 208-213, 2007.
  14. X. Su and R.V. Boppana, "Crosscheck Mechanism to Identify Malicious Nodes in Ad Hoc Networks," Security and Comm.Networks, vol. 2, no. 1, pp. 45-54, 2009.
  15. B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007.

Publication Details

Published in : Volume 1 | Issue 5 | September-October - 2015
Date of Publication Print ISSN Online ISSN
2015-10-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
124-133 IJSRSET151531   Technoscience Academy

Cite This Article

Ch. Kedari Rao, V. Pragathi, K. Yamini, "Intrusion Detection Techniques in Mobile Adhoc Networks Simulators from Attackers", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 5, pp.124-133, September-October-2015.
URL : http://ijsrset.com/IJSRSET151531.php




National Conference on Advances in Mechanical Engineering 2017(NCAME 2017)

National Conference on Emerging Trends in Civil Engineering 2017( NCETCE 2017)