HIDS: Honesty-rate based Collaborative Intrusion Detection System for mobile ad-hoc networks

被引:6
|
作者
Sen, Poly [1 ]
Chaki, Nabendu [2 ]
Chaki, Rituparna [3 ]
机构
[1] Asansol Engn Coll, Asansol, India
[2] Univ Calcutta, Kolkata 700009, W Bengal, India
[3] WB Univ Technol, Kolkata 700064, W Bengal, India
来源
SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CISIM.2008.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new Honest-rate base collaborative Intrusion Detection System (HIDS) has been proposed for mobile, ad-hoc networks. The method uses promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. All nodes join the network with an initial value of I for an honesty rate index, termed as h-rate. The h-rate of a node dynamically increases or decreases depending on its behavior. A node is rewarded when it forwards packets for other nodes. It is penalized when it does some malicious act like dropping packets, etc. The h-rate for a node N-X is recomputed based on its current h-rate, and the rewards or penalty points that it has accrued. The proposed rule-based scheme reduces the h-rate of a node gradually, if it behaves abnormally. This provides an inherent mechanism against phantom intrusion detection. The h-rate may also be used for secure routing in MANET.
引用
收藏
页码:121 / +
页数:2
相关论文
共 50 条
  • [31] Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant
    Zhou, Man
    Han, Lansheng
    Lu, Hongwei
    Fu, Cai
    COMPUTER NETWORKS, 2020, 172
  • [32] Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
    Di Wu Zhisheng Liu Yongxin Feng Guangxing Wang Department of Computer ScienceEngineeringDalian University of TechnologyDalian Research Center for Network and CommunicationNortheastern UniversityShenyang Institute of Computer Communication and NetworkShenyang Institute of TechnologyShenyangEmailwudidluteducn
    计算机工程与应用, 2004, (29) : 122 - 125
  • [33] A Dynamic Monitoring for Energy Consumption Reduction of a Trust-Based Intrusion Detection System in Mobile Ad-hoc Networks
    Lupia, Andrea
    Marano, Salvatore
    PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2016,
  • [34] Routeguard: An intrusion detection and response system for mobile ad hoc networks
    Hasswa, A
    Zulkernine, M
    Hassanein, H
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 336 - 343
  • [35] An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 119
  • [36] HOMOGENEOUS AND HETROGENEOUS INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS
    Ramkumar, P.
    Vimala, V.
    Sundari, G. Sivakama
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [37] Distributed Court System for intrusion detection in mobile ad hoc networks
    Zhang, Da
    Yeo, Chai Kiat
    COMPUTERS & SECURITY, 2011, 30 (08) : 555 - 570
  • [38] A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Peter X.
    Tang, Helen
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [39] A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc Networks
    Ma, Chuan-xiang
    Fang, Ze-ming
    Wang, Lei-chun
    Li, Qing-hua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 366 - +
  • [40] A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks
    Ma, Chuan-xiang
    Fang, Ze-ming
    IITSI 2009: SECOND INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS, 2009, : 198 - 201