A HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE ADHOC NETWORKS USING FBID PROTOCOL

被引:0
|
作者
Rajalakshmi, D. [1 ,2 ]
Meena, K. [1 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Chennai, Tamil Nadu, India
[2] Sri Sairam Inst Technol, Chennai, Tamil Nadu, India
来源
关键词
Security; Intrusion detection; AODV; MANET; Fuzzy; Cognitive Map; SECURITY;
D O I
10.12694/scpe.v21i1.1642
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A Security in a mobile ad hoc networks is more vulnerable and susceptible to the environment, because in this network no centralized environment for monitoring individual nodes activity during communication. The intruders are hacked the networks either locally and globally. Now a day's mobile ad hoc network is an emerging area of research due to its unique characteristics. It's more vulnerable to detect malicious activities, and error prone in nature due to their dynamic topology configuration. Based on their difficulties of intrusion detection system, in this paper proposed a novel approach for mobile ad hoc network is Fuzzy Based Intrusion Detection (FBID) protocol, to identify, analyze and detect a malicious node in different circumstances. This protocol it improves the efficiency of the system and does not degrade the system performance in real time. This FBID system is more efficient and the performance is compared with AODV, Fuzzy Cognitive Mapping with the following performance metrics: Throughput, Packet Delivery Ratio, Packets Dropped, Routing overhead, Propagation delay and shortest path for delivering packets from one node to another node. The System is robust. It produces the crisp output to the benefit of end users. It provides an integrated solution capable of detecting the majority of security attacks occurring in MANETs.
引用
收藏
页码:137 / 145
页数:9
相关论文
共 50 条
  • [31] Multi-agent cooperative intrusion response in mobile adhoc networks
    Yi Ping
    Zou Futai
    Jiang Xinghao
    Li Jianhua
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2007, 18 (04) : 785 - 794
  • [32] Multi-agent cooperative intrusion response in mobile adhoc networks
    Yi Ping
    State Key Lab. of Information Security
    JournalofSystemsEngineeringandElectronics, 2007, (04) : 785 - 794
  • [33] Hybrid intrusion detection system for wireless sensor networks
    Hai, Tran Hoang
    Khan, Faraz
    Huh, Eui-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 383 - 396
  • [34] QoS constrained adaptive routing protocol for mobile adhoc networks
    Kone, Vinod
    Nandi, Sukumar
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 40 - +
  • [35] Weightage Based Trusted QoS Protocol in Mobile Adhoc Networks
    Sirisala, Nageswararao
    Bindu, C. Shoba
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 283 - 287
  • [36] SECURE ZONE BASED ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
    Devi, B. A. S. Roopa
    Murthy, J. V. R.
    Narasimha, G.
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 839 - 846
  • [37] An Efficient Power Aware Routing Protocol For Mobile Adhoc Networks Using Cluster Head
    Pawan
    Sharma, A. K.
    Sharma, Rajendra K.
    Jain, Vinod
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2955 - 2958
  • [38] A hybrid immune intrusion detection system based on mobile agent
    Zhou, Xuanwu
    Yang, Xiaoyuan
    Wei, Ping
    Hu, Yupu
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 844 - 848
  • [39] SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS USING RSA ALGORITHM
    Sankaranarayanan, S.
    Murugaboopathi, G.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 354 - 357
  • [40] Network intrusion detection using hybrid neural networks
    Kumar, P. Ganesh
    Devaraj, D.
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 563 - +