We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection in MANET using Neural Networks and ZSBT

by D. Divya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 4
Year of Publication: 2013
Authors: D. Divya
10.5120/13998-2036

D. Divya . Intrusion Detection in MANET using Neural Networks and ZSBT. International Journal of Computer Applications. 81, 4 ( November 2013), 5-10. DOI=10.5120/13998-2036

@article{ 10.5120/13998-2036,
author = { D. Divya },
title = { Intrusion Detection in MANET using Neural Networks and ZSBT },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 4 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number4/13998-2036/ },
doi = { 10.5120/13998-2036 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:11.442760+05:30
%A D. Divya
%T Intrusion Detection in MANET using Neural Networks and ZSBT
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 4
%P 5-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network is a collection of mobile nodes that organize themselves into a network without any predefined infrastructure. The characteristics of MANET are dynamic topology; bandwidth and energy constrained and limited physical security. Due to the dynamic nature of the network, these networks can be easily vulnerable to attacks. Many type of attacks can threat the MANET and the classification of attacks are Black hole, Routing loops, Network partition, Selfishness, Sleep deprivation and Denial of Service. The MANET is mainly applied in military environments, personal area networking and emergency operations. This work provides a technique to improve the security level of MANET. The mechanism of intrusion detection is designed in MANET on the basis of artificial neural networks (ANNs) and Zone- Sampling Based Trace back algorithm (ZSBT) for detecting DOS attacks. Intrusion detection system is a type of security management system for computers and networks. The prevention mechanisms are thwarted by the ability of attackers to forge, or spoof, the source addresses in IP packets. By employing IP spoofing, attackers can evade from detection. But with the help of IDPF, the attacker node can be identified easily and it also has the ability to limit the IP spoofing capability. Artificial neural network and ZSBT modeling uses simulated MANET environments for detecting nodes under DOS attack effectively. But the ZSBT method works well for detecting DoS attacks in the network when compared with ANN methods.

References
  1. S. Yu, W. Zhou and R. Doss, Weijia Jia, "Traceback of DDoS Attacks Using Entropy Variations" IEEE transactions on parallel and distributed systems, March 2011.
  2. Sunita Sahu & Shishir K. Shandilya, "A Comprehensive Survey on Intrusion Detection in MANET" International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310, December 2010.
  3. Mofreh Salem, Amany Sarhan, Mostafa Abu-Bakr, "A DoS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks", ICGST- CNIR, Volume (7), Issue (I), July 2007.
  4. Zhenhai Duan, Xin Yuan and Jaideep Chandrashekar, "Controlling IP Spoofing Through Inter Domain Packet Filtering" In proc. IEEE INFOCOM 2006.
  5. Xin Jin, Yaoxue Zhang, Yi Pan and Yuezhi Zhou, "ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs", EURASIP Journal onWireless Communications and Networking Volume 2006.
  6. A. Helmy, "Contact-extended zone-based transactions routing for energy-constrained wireless ad hoc networks," IEEE Transactions on Vehicular Technology, vol. 54, no. 1, pp. 307–319, 2005.
  7. Y. Kim and A. Helmy, "SWAT: small world-based attacker traceback in Ad-hoc networks," in Proceedings of IEEE Infocom Poster/Demo Session (INFOCOM '05), Miami, Fla, USA, March 2005.
  8. H. C. J. Lee, V. L. L. Thing, Y. Xu, and M. Ma, "ICMP traceback with cumulative path, an efficient solution for IP traceback," in Proceedings of 5th International Conference on Information and Communications Security (ICICS '03), pp. 124–135,Huhehaote, China, October 2003.
  9. Y. Zhang, W. Lee and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks", Wireless Networks, vol 9 no. 5,pp. 545-556,2003.
  10. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP Traceback," in Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '00), pp. 295–306, Stockholm, Sweden, September 2000.
  11. R. Stone, "CenterTrack: an IP overlay network for tracking DoS floods," in Proceedings of 9th USENIX Security Symposium, pp. 199–212, Denver, Colo, USA, August 2000.
  12. D. E. Denning, "An intrusion-detection model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, February 1987.
Index Terms

Computer Science
Information Sciences

Keywords

DOS attack ANN MANET Intrusion detection ZSBT IDPF IP spoofing.