Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents

被引:4
|
作者
Esfandi, Abolfazl [1 ]
机构
[1] Islamic Azad Univ, Boroujerd Branch, Dept Comp Engn, Boroujerd, Iran
关键词
Mobile agents; Intrusion detection system; Adhoc networks; Network Security;
D O I
10.1109/ICCSIT.2010.5563804
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like denial of service or hack the information. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. This paper incorporates agents and data mining techniques to prevent anomaly intrusion in mobile adhoc networks. Innuendo, presenting an anomaly detection system comprises of detection modules for detecting anomalies in each layer. Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies. The Mobile agents monitoring the neighboring nodes and collect the information from neighboring home agents to determine the correlation among the observed anomalous patterns before it will send the data. This system was able to stop all of the successful attacks in an adhoc networks and reduce the false alarm positives.
引用
收藏
页码:73 / 77
页数:5
相关论文
共 50 条
  • [31] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [32] Flow Anomaly Based Intrusion Detection System for Android Mobile Devices
    Radoglou-Grammatikis, Panagiotis I.
    Sarigiannidis, Panagiotis G.
    2017 6TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2017,
  • [33] Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
    Cretu, Gabriela F.
    Parekh, Janak J.
    Wang, Ke
    Stolfo, Salvatore J.
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 635 - 639
  • [34] Multi-agent cooperative intrusion response in mobile adhoc networks
    Yi Ping
    Zou Futai
    Jiang Xinghao
    Li Jianhua
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2007, 18 (04) : 785 - 794
  • [35] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832
  • [36] MA_IDS : Mobile Agents for Intrusion Detection System
    Barika, F. A.
    El Kadhi, N.
    Ghedira, K.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 900 - +
  • [37] DIDMA: A distributed intrusion detection system using mobile agents
    Kannadiga, P
    Zulkernine, M
    SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERNG, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING AND FIRST AICS INTERNATIONAL WORKSHOP ON SELF-ASSEMBLING WIRELESS NETWORKS, PROCEEDINGS, 2005, : 238 - 245
  • [38] Intrusion detection and prevention system using secure mobile agents
    Shibli, Muhammad Awais
    Muftic, Sead
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 107 - +
  • [39] Cooperative Network Intrusion Detection System (CNIDS) in Mobile Adhoc Network based on DSR Protocol
    Adhikari, Sougato
    Setua, S. K.
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 929 - 935
  • [40] Multi-agent cooperative intrusion response in mobile adhoc networks
    Yi Ping
    State Key Lab. of Information Security
    JournalofSystemsEngineeringandElectronics, 2007, (04) : 785 - 794