HIDS: Honesty-rate based Collaborative Intrusion Detection System for mobile ad-hoc networks

被引:6
|
作者
Sen, Poly [1 ]
Chaki, Nabendu [2 ]
Chaki, Rituparna [3 ]
机构
[1] Asansol Engn Coll, Asansol, India
[2] Univ Calcutta, Kolkata 700009, W Bengal, India
[3] WB Univ Technol, Kolkata 700064, W Bengal, India
来源
SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CISIM.2008.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new Honest-rate base collaborative Intrusion Detection System (HIDS) has been proposed for mobile, ad-hoc networks. The method uses promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. All nodes join the network with an initial value of I for an honesty rate index, termed as h-rate. The h-rate of a node dynamically increases or decreases depending on its behavior. A node is rewarded when it forwards packets for other nodes. It is penalized when it does some malicious act like dropping packets, etc. The h-rate for a node N-X is recomputed based on its current h-rate, and the rewards or penalty points that it has accrued. The proposed rule-based scheme reduces the h-rate of a node gradually, if it behaves abnormally. This provides an inherent mechanism against phantom intrusion detection. The h-rate may also be used for secure routing in MANET.
引用
收藏
页码:121 / +
页数:2
相关论文
共 50 条
  • [21] Mobile agents-based intrusion detection system for mobile ad hoc networks
    Li, Yinan
    Qian, Zhihong
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 145 - 148
  • [22] An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
    K. Bala
    S. Jothi
    A. Chandrasekar
    Cluster Computing, 2019, 22 : 15205 - 15212
  • [23] Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks
    Watkins, D
    Scott, C
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 622 - 627
  • [24] Intrusion detection system for mobile Ad hoc networks based on the behavior of nodes
    Mamatha, S., 1600, Science and Engineering Research Support Society (07):
  • [25] Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
    Cabrera, Joao B. D.
    Gutierrez, Carlos
    Mehra, Raman K.
    INFORMATION FUSION, 2008, 9 (01) : 96 - 119
  • [26] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
    Mamatha, S.
    Damodaram, A.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
  • [27] An efficient intrusion detection in resource-constrained mobile ad-hoc networks
    Bouhaddi, Myria
    Radjef, Mohammed Said
    Adi, Kamel
    COMPUTERS & SECURITY, 2018, 76 : 156 - 177
  • [28] Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks
    Cabrera, Joao B. D.
    Gutierrez, Carlos
    Mehra, Raman K.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1831 - 1837
  • [29] TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
    Deb, Novarun
    Chaki, Nabendu
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 80 - 91
  • [30] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373