Design an Anomaly Based Fuzzy Intrusion Detection System for Packet Dropping Attack in Mobile Ad Hoc Networks

被引:0
作者
Chaudhary, Alka [1 ]
Tiwari, V. N. [1 ]
Kumar, Anil [1 ]
机构
[1] MUJ, Jaipur, Rajasthan, India
来源
SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2014年
关键词
mobile ad hoc networks (MANETs); intrusion detection system (IDS); MANETs security issues; detection methods; fuzzy logic; packet dropping attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the advancement in communication technologies, mobile ad hoc network increases the ability in terms of ad hoc communication between the mobile nodes. Mobile ad hoc networks do not use any predefined infrastructure during the communication so that all the present mobile nodes which are want to communicate with each other immediately form the topology and initiates the request for data packets to send or receive. In terms of security perspectives, communication via wireless links makes mobile ad hoc networks more vulnerable to attacks because any one can join and move the networks at any time. Particularly, in mobile ad hoc networks one of very common attack is packet dropping attack through the malicious node (s). This paper developed an anomaly based fuzzy intrusion detection system to detect the packet dropping attack from mobile ad hoc networks and this proposed solution also save the resources of mobile nodes in respect to remove the malicious nodes. For implementation point of view, qualnet simulator 6.1 and sugeno-type fuzzy inference system are used to make the fuzzy rule base for analyzing the results. From the simulation results it's proved that proposed system is more capable to detect the packet dropping attack with high positive rate and low false positive under each level (low, medium and high) of speed of mobile nodes.
引用
收藏
页码:256 / 261
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 1990, TECHNICAL REPORT
[2]  
[Anonymous], 1992, TECHNICAL REPORT
[3]  
[Anonymous], 1997, IEEE T AUTOM CONTROL, DOI DOI 10.1109/TAC.1997.633847
[4]   STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH [J].
ILGUN, K ;
KEMMERER, RA ;
PORRAS, PA .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) :181-199
[5]  
Kumar S., 1995, Proceedings of the 18th National Information Security Conference, P194
[6]  
Li Y., 2004, P INF SYST ED C
[7]  
Perkins CharlesE., 2003, RFC3561
[8]  
Ross T. J., FUZZY LOGIC ENG APPL
[9]  
Sen S., 2008, INTRUSION DETECTION
[10]  
Sen S., 2008, GUIDE WIRELESS AD HO