Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents

被引:4
|
作者
Esfandi, Abolfazl [1 ]
机构
[1] Islamic Azad Univ, Boroujerd Branch, Dept Comp Engn, Boroujerd, Iran
关键词
Mobile agents; Intrusion detection system; Adhoc networks; Network Security;
D O I
10.1109/ICCSIT.2010.5563804
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like denial of service or hack the information. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. This paper incorporates agents and data mining techniques to prevent anomaly intrusion in mobile adhoc networks. Innuendo, presenting an anomaly detection system comprises of detection modules for detecting anomalies in each layer. Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies. The Mobile agents monitoring the neighboring nodes and collect the information from neighboring home agents to determine the correlation among the observed anomalous patterns before it will send the data. This system was able to stop all of the successful attacks in an adhoc networks and reduce the false alarm positives.
引用
收藏
页码:73 / 77
页数:5
相关论文
共 50 条
  • [1] AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS
    Madhavi, S.
    Kim, Tai Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 1 - 16
  • [2] An intrusion detection system in mobile adhoc networks
    Madhavi, S.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 7 - 14
  • [3] Multi-layer integrated anomaly intrusion detection system for mobile adhoc networks
    Bose, S.
    Bharathimurugan, S.
    Kannan, A.
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 360 - +
  • [4] Secure Intrusion Detection System for Mobile Adhoc Networks
    Bharati, Taran Singh
    Kumar, R.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1257 - 1261
  • [5] An Efficient Neuro Deep Learning Intrusion Detection System for Mobile Adhoc Networks
    Venkateswaran, N.
    Prabaharan, S.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (06)
  • [6] A Comparative Study on Intrusion Detection in Mobile Adhoc Networks
    Divya, S.
    Krishnaveni, S. H.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [7] An improved intrusion detection technique for mobile adhoc networks
    Prasanna, S
    Vetriselvi, V
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 364 - 376
  • [8] A HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE ADHOC NETWORKS USING FBID PROTOCOL
    Rajalakshmi, D.
    Meena, K.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2020, 21 (01): : 137 - 145
  • [9] Energy Efficient Secure Clustering And Intrusion Detection With Resource Utilization In Mobile Adhoc Networks
    Khamalakhannen, A. D.
    Vanitha, Suthanthira
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [10] A hybrid intrusion detection system for mobile adhoc networks using fbid protocol
    Rajalakshmi D.
    Meena K.
    Rajalakshmi, D. (rajisacet@gmail.com), 1600, West University of Timisoara (21): : 137 - 145