Intrusion Detection Techniques in Mobile Adhoc Networks Simulators from Attackers

Authors

  • Ch. Kedari Rao  Department of Computer Science & Engineering in Sri Indu College of Engineering& Technology, Hyderabad, India
  • V. Pragathi  Sri Indu College of Engineering& Technology, Affiliated to JNTU-Hyderabad, India
  • K. Yamini  Sri Indu College of Engineering& Technology, Affiliated to JNTU-Hyderabad, India

Keywords:

Intrusion detection techniques, mobile unexpected networks, Adhoc network simulators, OPNET, Attackers.

Abstract

Several Intrusion Detection Techniques (IDTs) projected for mobile unexpected networks suppose every node passively watching the info forwarding by its next hop. This paper presents quantitative evaluations of false positives and their impact on watching based mostly intrusion detection for unexpected networks. Experimental results show that, even for a straightforward three-node configuration, associate actual adhoc network suffers from high false positives; these results area unit valid by mathematician and probabilistic models. However, this false positive downside can't be determined by simulating constant network mistreatment common unexpected network simulators, like ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model is enforced within the Glomosim machine. With this revised noise model, the simulated network exhibits the combination false positive behavior just like that of the experimental testbed. Simulations of larger (50-node) unexpected networks indicate that monitoring-based intrusion detection has terribly high false positives. These false positives will scale back the network performance or increase the overhead. in a very easy monitoring-based system wherever no secondary and additional correct strategies area unit used, the false positives impact the network performance in 2 ways: reduced turnout in traditional networks while not attackers and inability to mitigate the impact of attacks in networks with attackers.

References

  1. Cisco Systems Inc., Linksys WRT54G v2.2 Wireless-G Broadband Router, http://www.linksys.com, 2004.
  2. L. Eschenauer, V.D. Gligor, and J. Baras, "On Trust Establishment in Mobile Ad-Hoc Networks," Proc. Security Protocols, pp. 47-66, 2003.
  3. J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Dept. of Computer Science, Florida State Univ., 2005.
  4. R. Jain, The Art of Computer Systems Performance Analysis:Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley & Sons, 1991.
  5. M.R. Leadbetter, G. Lindgreen, and H. Rootze, Extremes and Related Properties of Random Sequences and Processes. Springer-Verlag, 1983.
  6. H. Lee, A. Cerpa, and P. Levis, "Improving Wireless Simulation through Noise Modeling," Proc. ACM Int'l Conf. Information Processing in Sensor Networks (IPSN '07), pp. 21-30, Apr. 2007.
  7. K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgement Based Approach for Detection of Routing Misbehavior in Manets," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
  8. K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
  9. Z. Liu, A. Joy, and R. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04), pp. 80-85,2004.
  10. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-Securing Ad Hoc Wireless Networks," Proc. Seventh IEEE Symp. Computers and Comm. (ISCC '02), 2002.
  11. S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom,pp. 255-265, Aug. 2000.
  12. R. Molva and P. Michiardi, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP Comm. and Multimedia Security Conf., 2002.
  13. X. Su and R.V. Boppana, "On the Impact of Noise on Mobile Ad Hoc Networks," Proc. ACM Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC '07), pp. 208-213, 2007.
  14. X. Su and R.V. Boppana, "Crosscheck Mechanism to Identify Malicious Nodes in Ad Hoc Networks," Security and Comm.Networks, vol. 2, no. 1, pp. 45-54, 2009.
  15. B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007.

Downloads

Published

2015-10-25

Issue

Section

Research Articles

How to Cite

[1]
Ch. Kedari Rao, V. Pragathi, K. Yamini, " Intrusion Detection Techniques in Mobile Adhoc Networks Simulators from Attackers, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 5, pp.124-133, September-October-2015.