CFP last date
20 December 2024
Reseach Article

A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET

by Trupti Agrawal, Swati Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 9
Year of Publication: 2014
Authors: Trupti Agrawal, Swati Tiwari
10.5120/17840-8727

Trupti Agrawal, Swati Tiwari . A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET. International Journal of Computer Applications. 102, 9 ( September 2014), 1-6. DOI=10.5120/17840-8727

@article{ 10.5120/17840-8727,
author = { Trupti Agrawal, Swati Tiwari },
title = { A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 9 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number9/17840-8727/ },
doi = { 10.5120/17840-8727 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:38.126120+05:30
%A Trupti Agrawal
%A Swati Tiwari
%T A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 9
%P 1-6
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is a type of wireless network, which works on radio frequencies and holds short range communication. As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less. In such network variable conditions of routing will face several issues which degrade its performance. Out of these securities is the major concern which deals with all the type of attacks & data packet security. Thus the node which is involved in such type of security breaches is called as malicious or misbehaving nodes & the mechanism used to prevent that comes under intrusion detection system. These intrusions can be prevented by various mechanisms like acknowledgement, monitoring nodes, behavior detections, data dropping & modifications, delay reductions etc. All the existing routing protocol assumes that the nodes within the range is behaving properly because they had not considered the mobility & network scenarios adoptions due to newly identified nodes. Our prime concern by proposing new updates for security is to demonstrate higher intrusion detection rates with minimized performance issues. This work proposes a new improved Feature Based Unified Node Data Analysis (FBU-NDA) Based IDS through AACK for AODV protocol. This quantity of response can be taken as major consideration for identification of intruder's node.

References
  1. Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, "EAACK—A Secure Intrusion-Detection System for MANETs", in IEEE Transaction on Industrial Electronics, ISSN: 0278-0046, Vol. 60, No 3, March 2013.
  2. S. Mamatha and Dr A Damodaram, "Quantitative Behaviour Based Intrusion Detection System for MANETS", in Proc. of the Intl. Conf. on Advances in Computing and Communication (ICACC), ISBN: 978-981-07-6260-5 doi:10. 3850/ 978-981-07-6260-5_59, April 2013.
  3. Umesh Prasad Rout, "A Study of Intrusion Detection Systems in MANETs", in International Journal of Research in Computer and Communication Technology, ISSN(Online) 2278-5841, Vol. 2, Issue 2, Feb-2013.
  4. S. Sasikala and M. Vallinayagam, "Secured Intrusion Detection System in Mobile Ad Hoc Network using RAODV ", in Proceedings published in International Journal of Computer Applications (IJCA), ISSN: 0975 – 8887, ICRTCT-2013.
  5. SagarPandiya, RakeshPandit and Sachin Patel, "Survey of Innovated Techniques to Detect Selfish Nodes in MANET", in International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), ISSN 2250-1568, Vol. 3, Issue 1, Mar 2013, 221-230.
  6. S. P. Manikandan and Dr. R. Manimegalai, "Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks", in International Journal on Computer Science and Engineering (IJCSE), ISSN: 0975-3397 Vol. 3 No. 9 September 2011.
  7. MarjanKuchaki Rafsanjani, Ali Movaghar, and FaroukhKoroupi, "Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes", in World Academy of Science, Engineering and Technology, 2008.
  8. Farhan Abdel-Fattah, Zulkhairi Md. Dahalin and ShaidahJusoh, "Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm", in IJCA Special Issue on "Mobile Ad-hoc Networks" MANETs, 2010.
  9. VinayP. Virada, "Intrusion Detection System (IDS) for Secure MANETs: A Study", in International Journal of Computational Engineering Research (IJCER), ISSN: 2250-3005, Vol. 2 Issue. 6, October 2012.
  10. Devi. P and A. Kannammal , "A Hybrid Defense Mechanism for DDoS attacks using Cluster Analysis in MANET", in conference of ICACCI'12, Chennai, Tamil Nadu,, ACM Journal, ISSN: 9781-4503, DOI-1196-0/12/0, July 2012.
  11. AikateriniMitrokotsa and Christos Dimitrakakis, "Intrusion detection in MANET using classification algorithms: The effects of cost and model selection", in ScienceDirect Elsevier Publication, Journal of Ad-Hoc Networks, ISSN: 1570-8705, available at http://dx. doi. org/10. 1016/j. adhoc. 2012. 05. 006, 2012.
  12. RakeshShrestha, Kyong-Heon Han, Dong-You Choi and Seung-Jo Han, "A Novel Cross Layer Intrusion Detection System in MANET", in IEEE International Conference on Advanced Information Networking and Applications, ISSN 1550-445X/10, DOI 10. 1109/AINA. 2010. 52, 2010.
  13. FarznehPakzad, MarjanKuchaki Rafsanjani and ArshamBorumandSaeid, "The Improvement Steps of Intrusion Detection System Architectures of MANET", in IJMAS, ISSN: 0973-7545, Vol. 22, Issue S11, 2011.
  14. Amir KhusruAkhtar and G. Sahoo, "Classification of Selfish and Regular Nodes Based on Reputation Values in MANET Using Adaptive Decision Boundary", in Science Research Journal of Communications and Network, ISSN: 0185-0191, doi:10. 4236/cn. 2013. 53021, May 2013.
  15. P. Vigneshwari, R. Anusha, D. Preethi, R. Jayashree and V. Nandhini, "Comparative Analysis of AODV and Trusted AODV (TAODV) in MANET", in International Journal of Advanced Information Science and Technology (IJAIST), ISSN: 2319:2682, Vol. 10, No. 10, February 2013.
  16. Tushar Sharma, MayankTiwari, Prateekkumar Sharma, Manish Swaroop and Pankaj Sharma, "An Improved Watchdog Intrusion Detection Systems In Manet", in International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2 Issue 3, March-2013.
  17. Huijun Chang, Hong Shan and Tao Ma, "Segmentation, Clustering and Timing Relationship Analysis of MANET Traffic Flow", in TELKOMNIKA, ISSN: 2087-278X, Vol. 11, No. 8, August 2013, pp. 4817~4823.
  18. Charlie Obimbo and Liliana Maria ArboledaCobo, "An Intrusion Detection System for MANET", Communications of Information Science and Management Engineering (CISME), Vol. 2 No. 3, 2012. pp. 1-5
  19. Yi Li and June Wei, "Guidelines on Selecting Intrusion Detection Methods in MANET", in Proc. of ISECON (EDSIG), Vol. 21, (Newport): §3233 (refereed), 2004.
  20. Arun Kumar. R, Abhishek M. K, Tejashwini. A. I, Niranjan J. T and Pradeep R. P, "A Review on Intrusion Detection Systems in MANET", in International Journal of Engineering Science and Innovative Technology (IJESIT), ISSN: 2319-5967, Volume 2, Issue 2, March 2013.
  21. Rohit Sharma and Samridhi Sharma, "Performance Analysis of Intrusion Detection in MANET", in International Journal of Computer Technology and Applications, ISSN: 2229-6093, Vol. 2 (3), 456-462.
  22. MouhannadAlattar, Françoise Sailhan and Julien Bourgeois, "Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol", in International Journal of Distributed Sensor Networks Volume 2013, Article ID 521497, 20 pages at http://dx. doi. org/10. 1155/2013/521497.
Index Terms

Computer Science
Information Sciences

Keywords

MANET (Mobile Ad-Hoc Network) AODV (Ad-Hoc on Demand Distance Vector) Feature Based Unified Node Data Analysis (FBU-NDA) IDS (Intrusion Detection System)