Intrusion Detection Techniques in Mobile Adhoc Networks Simulators from Attackers
Keywords:
Intrusion detection techniques, mobile unexpected networks, Adhoc network simulators, OPNET, Attackers.Abstract
Several Intrusion Detection Techniques (IDTs) projected for mobile unexpected networks suppose every node passively watching the info forwarding by its next hop. This paper presents quantitative evaluations of false positives and their impact on watching based mostly intrusion detection for unexpected networks. Experimental results show that, even for a straightforward three-node configuration, associate actual adhoc network suffers from high false positives; these results area unit valid by mathematician and probabilistic models. However, this false positive downside can't be determined by simulating constant network mistreatment common unexpected network simulators, like ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model is enforced within the Glomosim machine. With this revised noise model, the simulated network exhibits the combination false positive behavior just like that of the experimental testbed. Simulations of larger (50-node) unexpected networks indicate that monitoring-based intrusion detection has terribly high false positives. These false positives will scale back the network performance or increase the overhead. in a very easy monitoring-based system wherever no secondary and additional correct strategies area unit used, the false positives impact the network performance in 2 ways: reduced turnout in traditional networks while not attackers and inability to mitigate the impact of attacks in networks with attackers.
References
- Cisco Systems Inc., Linksys WRT54G v2.2 Wireless-G Broadband Router, http://www.linksys.com, 2004.
- L. Eschenauer, V.D. Gligor, and J. Baras, "On Trust Establishment in Mobile Ad-Hoc Networks," Proc. Security Protocols, pp. 47-66, 2003.
- J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Dept. of Computer Science, Florida State Univ., 2005.
- R. Jain, The Art of Computer Systems Performance Analysis:Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley & Sons, 1991.
- M.R. Leadbetter, G. Lindgreen, and H. Rootze, Extremes and Related Properties of Random Sequences and Processes. Springer-Verlag, 1983.
- H. Lee, A. Cerpa, and P. Levis, "Improving Wireless Simulation through Noise Modeling," Proc. ACM Int'l Conf. Information Processing in Sensor Networks (IPSN '07), pp. 21-30, Apr. 2007.
- K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgement Based Approach for Detection of Routing Misbehavior in Manets," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
- K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
- Z. Liu, A. Joy, and R. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04), pp. 80-85,2004.
- H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-Securing Ad Hoc Wireless Networks," Proc. Seventh IEEE Symp. Computers and Comm. (ISCC '02), 2002.
- S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom,pp. 255-265, Aug. 2000.
- R. Molva and P. Michiardi, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP Comm. and Multimedia Security Conf., 2002.
- X. Su and R.V. Boppana, "On the Impact of Noise on Mobile Ad Hoc Networks," Proc. ACM Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC '07), pp. 208-213, 2007.
- X. Su and R.V. Boppana, "Crosscheck Mechanism to Identify Malicious Nodes in Ad Hoc Networks," Security and Comm.Networks, vol. 2, no. 1, pp. 45-54, 2009.
- B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.