A Simple Scheme for Pseudo Clustering Algorithm for Cross Layer Intrusion Detection in MANET

被引:0
|
作者
Amouri, Amar [1 ]
Jaimes, Luis G. [2 ,3 ]
Manthena, Raju [1 ]
Morgera, Salvatore D. [1 ]
Vergara-Laurens, Idalides J. [3 ]
机构
[1] Univ S Florida, Dept Elect Engn, Tampa, FL 33620 USA
[2] Bethune Cookman Univ, Coll Sci Engn & Math, Daytona Beach, FL 32114 USA
[3] Univ Turabo, Dept Elect & Comp Engn, Gurabo, PR 00778 USA
关键词
MOBILE AD-HOC; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Mobile AdHoc Network (MANET) is a type of wireless network that does not require infrastructure for its operation; therefore, MANETs lack a centralized architecture which affects the level of security inside the network and increases vulnerability. Although encryption helps to increase network security level, it is not sufficient to protect against malicious intruders. An intrusion detection scheme is proposed in this paper based on cross layer feature collection from the medium access control (MAC) and network layers. The proposed method employs an hierarchical configuration that avoids using a clustering algorithm and, instead, sequentially activates the promiscuity (ability to sniff all packets transmitted by nodes within radio range) of the node based on its location in the network. The node in this case acts as a pseudo cluster head (PCH) that collects data from its neighboring nodes in each quadrant in the field and then uses this information to calculate an anomaly index (AI) in each quadrant. The mechanism uses a C4.5 decision tree to learn the network behavior under blackhole attack and is able to recognize blackhole attacks with up to 97% accuracy. The presented approach is twofold -it is energy efficient and has a high degree of intrusion detection with low overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Novel Cross Layer Intrusion Detection System in MANET
    Shrestha, Rakesh
    Han, Kyong-Heon
    Choi, Dong-You
    Han, Seung-Jo
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 647 - 654
  • [2] Agent Based Cross Layer Intrusion Detection System for MANET
    Devi, V. Anjana
    Bhuvaneswaran, R. S.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 427 - +
  • [3] Intrusion Detection Algorithm for MANET
    Srinivasan, S.
    Alampalayam, S. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (03) : 36 - 49
  • [4] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [5] A Framework of Cross Layer based Anomaly Intrusion Detection and Self Healing Model for MANET
    Jothilakshmi, K.
    Usha, G.
    Bose, S.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 429 - 433
  • [6] A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET
    Rathish, C. R.
    Karpagavadivu, K.
    Sindhuja, P.
    Kousalya, A.
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (01): : 45 - 54
  • [7] An Adaptive Clustering Algorithm for Intrusion Detection
    QIU JuliNormal University of AnshanAnshanChina
    现代电子技术, 2007, (02) : 130 - 132
  • [8] An adaptive clustering algorithm for intrusion detection
    Wu, Guowei
    Yao, Lin
    Yao, Kai
    2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 1443 - 1447
  • [9] A Clustering Algorithm Oriented to Intrusion Detection
    Li Wei
    Yang Zhong-ming
    Chang Ya-ping
    Zhang Bin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 862 - 865
  • [10] An unsupervised clustering algorithm for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2671 : 616 - 617