Multicast on-route cluster propagation using to identify the network intrusion detection system in mobile ad hoc network

被引:3
作者
Gracy Theresa, W. [1 ]
Prakash, M. [2 ]
Betina Antony, J. [3 ]
机构
[1] Panimalar Inst Technol, Dept CSE, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Sch Comp, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] SSN Coll Engn, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
anomaly detection; cluster; network‐ IDS; routing;
D O I
10.1002/dac.4850
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection, become a new paradigm in mobile ad hoc network which provide a sense of security to the existing computer and data network, is a retro-fit approach. The goal of intrusion detection, unauthorized use, misuse, and by insiders and both external penetrator system is to identify the abuse of computer systems. The increase of the connection of the computer system will provide greater access to outsiders; for the intruder, the identification of avoidance becomes a challenge. We propose a multicast on-route cluster propagation (MORCP) based network intrusion detection system to improve the security based on route analysis. The number of IDS of the prototype has been developed in a number of transmissions on miss-behavioral transmission. Some of them also have been experimentally deployed in a production system. In addition, segregate path identification algorithm (SPIA) of host-based and network-based IDS is investigated, and the characteristics of the corresponding system are identified. In host-based systems, most of the network-based IDS, to construct a detection mechanism on the network traffic monitored, as well, while some adoption host audit trail, in order to detect the intrusion activity, input as the main source of information, to adopt an audit trail of the hot operating system. The overview of typical use statistical anomaly detection algorithm in IDS is also included.
引用
收藏
页数:12
相关论文
共 20 条
  • [1] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    [J]. COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [2] [Anonymous], KDD CUP 99 DATASET
  • [3] Chandre PR., 2019, MACHINE LEARNING BAS
  • [4] Djdjig, 2017, IEE INT C IOT IEEE G
  • [5] Dunyi YU, 2018, RES ANOMALY INTRUSIO, P540
  • [6] Ghugar U., 2018, P 5 INT C PAR DISTR, P512
  • [7] Ghugar U., 2018, PL IDS PHYS LAYER TR
  • [8] A survey of trust computation models for service management in internet of things systems
    Guo, Jia
    Chen, Ing-Ray
    Tsai, Jeffrey J. P.
    [J]. COMPUTER COMMUNICATIONS, 2017, 97 : 1 - 14
  • [9] Li P., 2019, COMPUT MODERNIZATION, V37, P12
  • [10] Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments
    Meng, Weizhi
    Li, Wenjuan
    Kwok, Lam For
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (01): : 233 - 245