Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents

被引:4
|
作者
Esfandi, Abolfazl [1 ]
机构
[1] Islamic Azad Univ, Boroujerd Branch, Dept Comp Engn, Boroujerd, Iran
关键词
Mobile agents; Intrusion detection system; Adhoc networks; Network Security;
D O I
10.1109/ICCSIT.2010.5563804
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like denial of service or hack the information. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. This paper incorporates agents and data mining techniques to prevent anomaly intrusion in mobile adhoc networks. Innuendo, presenting an anomaly detection system comprises of detection modules for detecting anomalies in each layer. Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies. The Mobile agents monitoring the neighboring nodes and collect the information from neighboring home agents to determine the correlation among the observed anomalous patterns before it will send the data. This system was able to stop all of the successful attacks in an adhoc networks and reduce the false alarm positives.
引用
收藏
页码:73 / 77
页数:5
相关论文
共 50 条
  • [11] Intrusion Detection System for Energy Efficient Cluster Based Vehicular Adhoc Networks
    Lavanya, R.
    Kannan, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (01): : 323 - 337
  • [12] Intrusion Detection System for Energy Efficient Cluster based Vehicular Adhoc Networks
    Krishna, M. V. B. Murali M.
    Ananth, C. Anbu
    Raj, N. Krishna
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 228 - 235
  • [13] A NONCOOPERATIVE GAME APPROACH FOR INTRUSION DETECTION IN MOBILE ADHOC NETWORKS
    Poongothai, T.
    Jayarajan, K.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 51 - +
  • [14] Comparative Analysis of Intrusion Detection System in Reactive Routing Protocols of Mobile Adhoc Networks
    Chawhan, Manish Devendra
    Khan, Ausaf Umar
    Kulat, Kishore Damodar
    Neole, Bhumika
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 566 - 572
  • [15] Intrusion Detection in Mobile AdHoc Networks using Machine Learning Approach
    Poongothai, T.
    Duraiswamy, K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [16] A Semi-distributed Reputation-based Intrusion Detection System for Mobile Adhoc Networks
    Trivedi, Animesh Kr
    Arora, Rajan
    Kapoor, Rishi
    Sanyal, Sudip
    Sanyal, Sugata
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (04): : 265 - 273
  • [17] Intrusion Detection for Adhoc Networks in IOT
    Girnar, Niharika
    Kaur, Sanmeet
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 110 - 114
  • [18] Mobile agents-based intrusion detection system for mobile ad hoc networks
    Li, Yinan
    Qian, Zhihong
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 145 - 148
  • [19] A mobile agents and artificial neural networks for intrusion detection
    El Kadhi, N. (nelkadhi@ahliauniversity.edu.bh), 1600, Academy Publisher (07):
  • [20] An Improved Intrusion Detection Method In Mobile AdHoc Network
    Yin, Fangchao
    Feng, Xin
    Han, Yonglin
    He, Libai
    Wang, Huan
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 527 - +