CFP last date
20 December 2024
Reseach Article

Co-operative IDS Architectures for MANETs - A Survey

by Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 1
Year of Publication: 2013
Authors: Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi
10.5120/9896-4471

Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi . Co-operative IDS Architectures for MANETs - A Survey. International Journal of Computer Applications. 61, 1 ( January 2013), 39-45. DOI=10.5120/9896-4471

@article{ 10.5120/9896-4471,
author = { Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi },
title = { Co-operative IDS Architectures for MANETs - A Survey },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 1 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number1/9896-4471/ },
doi = { 10.5120/9896-4471 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:56.774106+05:30
%A Kapil Dhamecha
%A Rutvik Upadhyay
%A Bhushan Trivedi
%T Co-operative IDS Architectures for MANETs - A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 1
%P 39-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are many IDSs (Intrusion Detection System) which are working on wired networks, but for MANETs we do not find any single application that can be applied directly. Different characteristics of MANET make the conventional IDSs ineffective and inefficient for the wireless environment. MANET is a combination of nodes with limited power, bandwidth and processing capability. In MANETs, an intrusion detection task performed by a single node reduces power level drastically in no time. Because of power constraints, we have to distribute the task among several nodes so that we can uphold the power level of legitimated nodes. In this paper we evaluate different performance parameters of distributed and cooperative IDSs and we also try to figure out which parameters are detracting, such as accuracy ratio, false positive and false negative detection ratio, node mobility, type of threat model and the complexity of the algorithm etc.

References
  1. Albers P, Camp O, Percher J. , Jouga B, Me L, Puttini R. , 2002:Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches, Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), pp. 1–12
  2. Bose S, Bharathimurugan S, Kannan A, February 2007, :Multilayer Integrated Anomaly Intrusion Detection System for Mobile Ad Hoc Networks, IEEE ICSCN 2007, MIT Campus, Anna University, Chennai, India, pp. 360-365.
  3. Kachirski O, Guha R. K, 2003: Effective intrusion detection using multiple sensors in wireless ad hoc networks, Proceedings of HICS, 57
  4. Kazienko P. , Dorosz P: Intrusion detection systems. Part I. Intrusion types and symptoms. Tasks and architecture of IDS. Translation from Polish , IT FAQ 12/2002, pp. 21-27
  5. Komninos N, Douligeris C, January 2009 : LIDF: Layered intrusion detection framework for ad-hoc network, Elsevier Ad Hoc Networks, vol. 7, issue 1, pp. 171 – 182,
  6. Razak S. A. , Furnell S. M. , Clarke N. L. , Brooke P. J. , September 2008: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks, Elsevier Ad Hoc Networks, vol. 6, issue 7, pp. 1151 – 1167.
  7. Ramachandran C, Misra S, Obaidat M, October 2008: FORK: A novel two-pronged strategy for an agent based intrusion detection scheme in ad-hoc networks, Elsevier Computer Communications, vol. 31, issue 16, Performance Evaluation of Communication Networks (SPECTS 2007), pp. 3855-3869.
  8. Sun B. , Wu K. , Pooch U. W , 2003: Routing anomaly detection in mobile ad hoc networks, IEEE International Conference on Computer Communications and Networks, (ICCCN'03), pp. 25-31.
  9. Sun B, Wu K. , Xiao Y, Wang R, June 2007: Integration of mobility and intrusion detection for wireless ad hoc networks, Wiley International Journal of Communication Systems, vol. 20, issue 6, pp. 695 – 721.
  10. Srinivasan T. , Seshadri J. , Sidharth Jonathan J. B. , Chandrasekhar A, august 2005 : A system for power aware intrusion detection in wireless ad-hoc networks, Proceedings of Third International Conference on Computer Networks and Mobile Computing, ICCNMC 2005, Springer Verlag, Berlin, Heidelberg, 2005, pp. 153–162. LNCS 3619, Zhangjiajie, China,
  11. Srinivasan T, Vijaykumar V, Chandrasekar R, 2006 : An auction based task allocation scheme for power-aware intrusion detection in wireless ad-hoc networks, Proceedings of the Third International Conference on Wireless and Optical Networks, IEEE, Bangalore, India
  12. Wang W. , H. Man, Y. Liu , April, 2009: A Framework for Intrusion Detection Systems by Social Network Analysis Methods in Ad Hoc Networks, Wiley Security and Communication Networks, vol. 2, issue 6, pp. 669 – 685.
  13. Wireless Security Workshop, Sep2002 :WiSe'02 workshop on wireless security, Atlanta, pp. 11–20.
  14. Yang, Meng X. , Lu S,2002: Self-organized network-layer security in mobile ad hoc networks", wise 02 proceeding of first acm workshop on wireless security, pages 11-20
  15. Zhang Y, Lee W, Huang Y :A Intrusion detection techniques for mobile wireless networks, Wireless Network 9 (5) (2003) 545–556.
  16. Zhang R. , 2004Using constructive induction to enhance the predictive accuracy of the c5 machine learning environment, Proceedings of IC-AI, pp. 1117–112.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system (IDS) Mobile Ad-Hoc network (MANET) Co-operative architecture