HIDS: Honesty-rate based Collaborative Intrusion Detection System for mobile ad-hoc networks

被引:6
|
作者
Sen, Poly [1 ]
Chaki, Nabendu [2 ]
Chaki, Rituparna [3 ]
机构
[1] Asansol Engn Coll, Asansol, India
[2] Univ Calcutta, Kolkata 700009, W Bengal, India
[3] WB Univ Technol, Kolkata 700064, W Bengal, India
来源
SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CISIM.2008.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new Honest-rate base collaborative Intrusion Detection System (HIDS) has been proposed for mobile, ad-hoc networks. The method uses promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. All nodes join the network with an initial value of I for an honesty rate index, termed as h-rate. The h-rate of a node dynamically increases or decreases depending on its behavior. A node is rewarded when it forwards packets for other nodes. It is penalized when it does some malicious act like dropping packets, etc. The h-rate for a node N-X is recomputed based on its current h-rate, and the rewards or penalty points that it has accrued. The proposed rule-based scheme reduces the h-rate of a node gradually, if it behaves abnormally. This provides an inherent mechanism against phantom intrusion detection. The h-rate may also be used for secure routing in MANET.
引用
收藏
页码:121 / +
页数:2
相关论文
共 50 条
  • [41] Probabilistic Monitoring in Intrusion Detection Module for Energy Efficiency in Mobile Ad-hoc Networks
    De Rango, Floriano
    Lupia, Andrea
    UNMANNED SYSTEMS TECHNOLOGY XVIII, 2016, 9837
  • [42] Routing system in mobile ad-hoc networks
    Minochkin, A., I
    Romanjuk, V. A.
    2006 16TH INTERNATIONAL CRIMEAN CONFERENCE MICROWAVE & TELECOMMUNICATION TECHNOLOGY, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 359 - +
  • [43] Intrusion Detection System for Wireless Ad-hoc network
    Chandravanshi, Kamlesh
    Tiwari, Akrosh
    Bathre, Mukesh
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 272 - +
  • [44] Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks
    Luo, Junhai
    Liu, Xue
    Zhang, Yi
    Ye, Danxia
    Xu, Zhong
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 294 - +
  • [45] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [46] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [47] Host based intrusion detection architecture for mobile ad hoc networks
    Ray, Prabhudutta
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1942 - 1946
  • [48] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [49] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [50] Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation
    Lin, T.
    Wu, P.
    Gao, F. M.
    Wu, T. S.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2019, 14 (05) : 660 - 671