CFP last date
20 January 2025
Reseach Article

A Fast Construction of Intrusion Relieved Communication Path based on Trust level and Heuristic Search

by R. Reshma, S. K. Srivatsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 22
Year of Publication: 2013
Authors: R. Reshma, S. K. Srivatsa
10.5120/10763-5168

R. Reshma, S. K. Srivatsa . A Fast Construction of Intrusion Relieved Communication Path based on Trust level and Heuristic Search. International Journal of Computer Applications. 63, 22 ( February 2013), 1-6. DOI=10.5120/10763-5168

@article{ 10.5120/10763-5168,
author = { R. Reshma, S. K. Srivatsa },
title = { A Fast Construction of Intrusion Relieved Communication Path based on Trust level and Heuristic Search },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 22 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number22/10763-5168/ },
doi = { 10.5120/10763-5168 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:02.050841+05:30
%A R. Reshma
%A S. K. Srivatsa
%T A Fast Construction of Intrusion Relieved Communication Path based on Trust level and Heuristic Search
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 22
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An Adhoc network is subjected to many malicious activities and security threatens because of its wide distribution and heterogeneous nature. Intrusion is one among such activities that comprise confidentiality, integrity or availability of resources. Numerous efforts have been made in the literature to detect intrusion in an Adhoc network, however less number of efforts have been put to construct an intrusion relieved network. In the previous work, we proposed a methodology to construct an intrusion relieved network based on trust level of every node. The methodology used Rotboost algorithm to estimate the trust level of every node in the upcoming instants. As the learning of Rotboost requires more time, we planned to incorporate a fast learning algorithm to improve the efficiency of the methodology. Moreover, this paper introduces an efficient heuristic search algorithm to find the shortest path instead Dijkstra algorithm. As Dijkstra is time consuming in determining shortest possible network paths, it ultimately affects the efficiency of constructing intrusion free path. Replacing Dijkstra by heuristic search algorithm can lead to better performance in terms of computational complexity and the intrusion free path can be constructed in an efficient way. Hence a modified architecture for intrusion detection and intrusion free path detection is constructed and simulated. The simulation results show that the modified architecture outperforms the conventional architecture in terms of intrusion detection rate, path costs and computational times.

References
  1. Ashok Chalak, Naresh D Harale, RohiniBhosale, "Data Mining Techniques for Intrusion Detection and Prevention System" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 8, August 2011.
  2. P. Garcia-Teodoro, J. Diaz-Verdejo, Macia-Fernandez, E. Vazquez, "Anomaly-based network intrusion detection: Tecniques, systems and challenges", Computer Communications, vol. 27, pp. 1569-1584, 2004.
  3. Adebayo O. Adetunmbi, Samuel O. Falaki, Olumide S. Adewale and Boniface K. Alese, " Network Intrusion Detection based on Rough Set and k-Nearest Neighbour" International Journal of ,Computing and ICT Research, Vol. 2, No. 1, pp. 60 - 66, 2008.
  4. Adetunmbi A. . O. , Zhiwei S. , Zhongzhi S. , and Adewale O. S. , "Network Anomalous Intrusion Detection using Fuzzy-Bayes" , in IFIP International Federation for Information Processing, Vol. 228, Intelligent Information Processing , pp. 525 – 530, 2006.
  5. Biswanath, M. , Todd L. H. , and Karl, N. L. 1994. Network Intrusion Detection. IEEE Network, 8(3): 26-41.
  6. Byunghae-Cha, K. P. and Jaittyun, S. 2005. Neural Networks Techniques for Host anomaly Intrusion Detection using Fixed Pattern Transformation. ICCSA 2005, LNCS 3481 pp. 254-263.
  7. J. P Anderson "Computer Security Threat Monitoring and Surveillance", Technical report
  8. Lee, W. , Stolfo, S. J. and Mok, K. 1999. "Data Mining in work flow environments: Experiments in intrusion detection", In Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining
  9. Renuka Devi Thanasekaran, "A Robust and Efficient Real Time Network Intrusion Detection System Using Artificial Neural Network In Data Mining", International Journal of Information Technology Convergence and Services (IJITCS) Vol. 1, No. 4, August 2011
  10. Fatin Norsyafawati Mohd Sabri, Norita Md. Norwawi, and Kamaruzzaman Seman, "Identifying False Alarm Rates for Intrusion Detection System with Data Mining", International Journal of Computer Science and Network Security, VOL. 11 No. 4, April 2011
  11. Ghanshyam Prasad Dubey, Neetesh Gupta and Rakesh K Bhujade, "A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM", International Journal of Soft Computing and Engineering (IJSCE), Vol. 1, No. 1, March 2011
  12. RituRanjani Singh, Neetesh Gupta, Shiv Kumar, "To Reduce the False Alarm in Intrusion Detection System using self-Organizing Map", International Journal of Soft Computing and Engineering (IJSCE) , Vol. 1, No. 2, May 2011
  13. R. Shanmugavadivu and N. Nagarajan "Network Intrusion Detection System Using Fuzzy Logic", Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2, No. 1, pp. 101-111, 2011
  14. S. SathyaBama, M. S. Irfan Ahmed, A. Saravanan, "Network Intrusion Detection using Clustering: A Data Mining Approach", International Journal of Computer Applications , Vol. 30, No. 4, September 2011
  15. G. V. Nadiammai, S. Krishnaveni and M. Hemalatha, "A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques", International Journal of Computer Applications, Vol. 35, No. 8, December 2011
  16. JaydipSen, "A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks", Communications in Computer and Information Science, vol. 89,no. 2,pp. 538-547, 2010.
  17. JaydipSen, "An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks", In transactions of 2nd International Conference on Computational Intelligence, Communication Systems and Networks, 2010.
  18. D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt and J. Rowe, "A General Cooperative Intrusion Detection Architecture for MANETs", In proceedings of the Third IEEE International Workshop on Information Assurance, 2005.
  19. C. Beak, J. A. Chaudhry, K. Lee, S. Park and M. Kim, "A Novel Packet Marketing Method in DDoS Attack Detection", American Journal of Applied Sciences, vol. 4, no. 10, pp. 741-745, 2007.
  20. Chun-Xia Zhang, Jiang-She Zhang, "RotBoost: A technique for combining Rotation Forest and AdaBoost", Pattern Recognition Letters 29 (2008) 1524–1536
  21. R. Reshma and S. K. Srivasta, "An Efficient Architecture for Detection of Intrusion andIntrusion Relieved Communication Path byMeans of Trust Level", European Journal of Scientific Research, Vol. 88, No. 2,pp. 293-301, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Heuristic Path Identifier Fast learning Rotboost intelligence