A Simple Scheme for Pseudo Clustering Algorithm for Cross Layer Intrusion Detection in MANET

被引:0
|
作者
Amouri, Amar [1 ]
Jaimes, Luis G. [2 ,3 ]
Manthena, Raju [1 ]
Morgera, Salvatore D. [1 ]
Vergara-Laurens, Idalides J. [3 ]
机构
[1] Univ S Florida, Dept Elect Engn, Tampa, FL 33620 USA
[2] Bethune Cookman Univ, Coll Sci Engn & Math, Daytona Beach, FL 32114 USA
[3] Univ Turabo, Dept Elect & Comp Engn, Gurabo, PR 00778 USA
关键词
MOBILE AD-HOC; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Mobile AdHoc Network (MANET) is a type of wireless network that does not require infrastructure for its operation; therefore, MANETs lack a centralized architecture which affects the level of security inside the network and increases vulnerability. Although encryption helps to increase network security level, it is not sufficient to protect against malicious intruders. An intrusion detection scheme is proposed in this paper based on cross layer feature collection from the medium access control (MAC) and network layers. The proposed method employs an hierarchical configuration that avoids using a clustering algorithm and, instead, sequentially activates the promiscuity (ability to sniff all packets transmitted by nodes within radio range) of the node based on its location in the network. The node in this case acts as a pseudo cluster head (PCH) that collects data from its neighboring nodes in each quadrant in the field and then uses this information to calculate an anomaly index (AI) in each quadrant. The mechanism uses a C4.5 decision tree to learn the network behavior under blackhole attack and is able to recognize blackhole attacks with up to 97% accuracy. The presented approach is twofold -it is energy efficient and has a high degree of intrusion detection with low overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks
    Nadeem, Adnan
    Howarth, Michael P.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2027 - 2045
  • [22] Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks
    Menaka Pushpa Arthur
    Kathiravan Kannan
    Wireless Networks, 2016, 22 : 1035 - 1059
  • [23] Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks
    Arthur, Menaka Pushpa
    Kannan, Kathiravan
    WIRELESS NETWORKS, 2016, 22 (03) : 1035 - 1059
  • [24] Intrusion Detection for MANET to Detect Unknown Attacks Using Genetic Algorithm
    Lalli, M.
    Palanisamy, V.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 976 - 980
  • [25] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [26] A Parallel Clustering Ensemble Algorithm for Intrusion Detection System
    Gao, Hongwei
    Zhu, Dingju
    Wang, Xiaomin
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 450 - 453
  • [27] G-Means: A Clustering Algorithm for Intrusion Detection
    Zhao, Zhonghua
    Guo, Shanqing
    Xu, Qiuliang
    Ban, Tao
    ADVANCES IN NEURO-INFORMATION PROCESSING, PT I, 2009, 5506 : 563 - +
  • [28] The Research of Intrusion Detection Based on Mixed Clustering Algorithm
    Liu, Nanyan
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 92 - 100
  • [29] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [30] Application of a New Fuzzy Clustering Algorithm in Intrusion Detection
    WU Tiefeng Jiamusi UniversityJiamusiChinaXidian UniversityXianChina
    现代电子技术, 2008, (04) : 100 - 102