CFP last date
20 January 2025
Reseach Article

A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network

by Devendra Singh, S. S. Bedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 5
Year of Publication: 2013
Authors: Devendra Singh, S. S. Bedi
10.5120/14110-1870

Devendra Singh, S. S. Bedi . A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications. 82, 5 ( November 2013), 7-12. DOI=10.5120/14110-1870

@article{ 10.5120/14110-1870,
author = { Devendra Singh, S. S. Bedi },
title = { A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 5 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number5/14110-1870/ },
doi = { 10.5120/14110-1870 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:56:57.718063+05:30
%A Devendra Singh
%A S. S. Bedi
%T A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 5
%P 7-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad Hoc Networks are more vulnerable to attacks. Due to vulnerability, security in MANETs has been an issue of prime importance in the recent years. The common attack prevention techniques such as cryptographic techniques (Authentication/Digital Signatures) cannot be implemented in MANETs as there is no central controlling device for authentication. This necessitates the need for some other security mechanisms to prevent/detect various types of attacks in MANETs. One such mechanism is to implement Intrusion Detection System. Intrusion Detection System (IDS) has been widely studied in the past and continues to be focus of research in the recent years. This paper summarizes the most prominent IDS Architectures for MANETs published in the last five years. The summary includes brief descriptions of IDS architecture, IDS Techniques (Detection Engines), Types of Attacks detected and Data gathering techniques, followed by the author's comments on strength, weaknesses and limitations of each technique. Further, a comprehensive table is presented including all summarized papers, at a glance, lists salient features and author's comments for each technique to facilitate new researchers to select a specific area for their work.

References
  1. Li, Y and J Wei. Guidelines on Selecting Intrusion Detection Methods in MANET. In The Proceedings of the Information Systems Education Conference 2004, v 21 (Newport): §3233. ISSN: 1542-7382.
  2. Satria Mandala, Md. Asri Ngadi, A. Hanan Abdullah, "A Survey on MANET Intrusion Detection", International Journal of Computer Science and Security, Volume (2): Issue (1). 2008
  3. Kuchaki Rafsanjani, Marjan; Movaghar, Ali; Koroupi, Faroukh:, "Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes" Proceedings of World Academy of Science: Engineering & Technolog;Oct2008, Vol. 46, p351
  4. Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis, A comparative evaluation of intrusion detection architectures for mobile ad hoc networks, Computers & Security, Volume 30, Issue 1, January 2011, Pages 63-80, ISSN 0167-4048
  5. A Deb, Novarun, Chakraborty, Manali, Chaki, Nabendu, "A State-of-the-Art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks" Communications in Computer and Information Science P 169-179, 978-3-642-24036-2, P 169-179, 2011
  6. Y. Zhang, W. Lee, and Y. Huang, Intrusion Detection Techniques for Mobile Wireless Networks," ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
  7. Stamouli, L. ; Argyroudis, P. G. ; Tewari, H. ; , "Real-time intrusion detection for ad hoc networks," World of Wireless Mobile and Multimedia Networks, 2005. WoWMoM 2005. Sixth IEEE International Symposium on a , vol. , no. , pp. 374- 380, 13-16 June 2005
  8. Rajeswari, L. Prema; Annie, R. Arockia Xavier; Kannan, A. ; , "Enhanced intrusion detection techniques for mobile ad hoc networks," Information and Communication Technology in Electrical Sciences (ICTES 2007), 2007. ICTES. IET-UK International Conference on , vol. , no. , pp. 1008-1013, 20-22 Dec. 2007
  9. Abdelhaq, M. ; Serhan, S. ; Alsaqour, R. ; Hassan, R. ; , "A local intrusion detection routing security over MANET network," Electrical Engineering and Informatics (ICEEI), 2011 International Conference on , vol. , no. , pp. 1-6, 17-19 July 2011
  10. H. Deng, W. Li and D. Agrawal, "Routing security in ad hoc networks," IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, 2002.
  11. Karygiannis, A. ; Antonakakis, E. ; Apostolopoulos, A. ; , "Detecting critical nodes for MANET intrusion detection systems," Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on , vol. , no. , pp. 9 pp. -15, 29-29 June 2006
  12. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, Y. Yesha, Threshold-based intrusion detection in ad hoc networks and secure AODV, Ad Hoc Networks, Volume 6, Issue 4, June 2008, Pages 578-599, ISSN 1570-8705
  13. Shrestha, R. ; Kyong-Heon Han; Dong-You Choi; Seung-Jo Han; , "A Novel Cross Layer Intrusion Detection System in MANET," Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on , vol. , no. , pp. 647-654, 20-23 April 2010
  14. Husain, S. ; Gupta, S. C. ; Chand, M. ; Mandoria, H. L. ; , "A proposed model for Intrusion Detection System for mobile adhoc network," Computer and Communication Technology (ICCCT), 2010 International Conference on , vol. , no. , pp. 99-102, 17-19 Sept. 2010
  15. "A SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORK" M. Vallinayagam, S. Sasikala International Journal of Computer Science and Management Research Vol 1 Issue 4 November 2012
  16. Chaki, R. ; Chaki, N. ; , "IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network," Computer Information Systems and Industrial Management Applications, 2007. CISIM '07. 6th International Conference on , vol. , no. , pp. 179-184, 28-30 June 2007
  17. Abhijeet Deodhar and Ritesh Gujrathi "A Cluster Based Intrusion Detection System for Mobile Ad Hoc Networks" 2008.
  18. Chuan-Xiang Ma; Ze-ming Fang; Lei-chun Wang; Qing-Hua Li; , "A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc Networks," Multimedia Information Networking and Security, 2009. MINES '09. International Conference on , vol. 2, no. , pp. 366-369, 18-20 Nov. 2009
  19. Sterne, D. ; Lawler, G. ; , "A dynamic intrusion detection hierarchy for MANETs," Sarnoff Symposium, 2009. SARNOFF '09. IEEE , vol. , no. , pp. 1-8, March 30 2009-April 1 2009 doi: 10. 1109/SARNOF. 2009.
  20. Manikandan, T. ; Sathyasheela, K. B. ; , "Detection of malicious nodes in MANETs," Communication Control and Computing Technologies (ICCCCT), 2010 IEEE International Conference on , vol. , no. , pp. 788-793, 7-9 Oct. 2010
  21. Al-Hujailan, H. ; Al-Rodhaan, M. ; Al-Dhelaan, A. ; , "A cooperative intrusion detection scheme for clustered mobile ad hoc networks," Information Assurance and Security (IAS), 2011 7th International Conference on , vol. , no. , pp. 179-185, 5-8 Dec. 2011
  22. Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes: Agent-based Distributed Intrusion Detection Methodology for MANETs. Security and Management 2006
  23. B. Pahlevanzadeh, S. A. Hosseini Seno, T. C. Wan, R. Budiarto, Mohammed M. Kadhum "A Cluster-Based Distributed Hierarchical IDS for MANETs" International Conference on Network Applications, Protocols and Services 2008 (NetApps2008) 21 - 22 November 2008 Executive Development Center, Universiti Utara Malaysia.
  24. Zonghua Zhang; Nait-Abdesselam, F. ; Djahel, S. ; , "ARSoS: An Adaptive, Robust, and Sub-Optimal Strategy for Automated Deployment of Anomaly Detection System in MANETs," Wireless Communications and Mobile Computing Conference, 2008. IWCMC '08. International , vol. , no. , pp. 606-613, 6-8 Aug. 2008
  25. Mechtri, L. ; Tolba, F. D. ; Ghanemi, S. ; , "MASID: Multi-Agent System for Intrusion Detection in MANET," Information Technology: New Generations (ITNG), 2012 Ninth International Conference on , vol. , no. , pp. 65-70, 16-18 April 2012
Index Terms

Computer Science
Information Sciences

Keywords

MANET (Mobile Ad hoc networks) IDS (Intrusion Detection System) AODV (Ad hoc On-demand Distance Vector) DSR (Dynamic Source Routing) NS2 (Network Simulator2).