We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Comparative Analysis of Architectures for Intrusion Detection Systems against DoS Attacks in MANETs based on Chi-Square Test

by A. Anna Lakshmi, S. Anandkumar, G. Nagarajan, K. R. Valluvan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 4
Year of Publication: 2014
Authors: A. Anna Lakshmi, S. Anandkumar, G. Nagarajan, K. R. Valluvan
10.5120/15198-3580

A. Anna Lakshmi, S. Anandkumar, G. Nagarajan, K. R. Valluvan . Comparative Analysis of Architectures for Intrusion Detection Systems against DoS Attacks in MANETs based on Chi-Square Test. International Journal of Computer Applications. 87, 4 ( February 2014), 27-33. DOI=10.5120/15198-3580

@article{ 10.5120/15198-3580,
author = { A. Anna Lakshmi, S. Anandkumar, G. Nagarajan, K. R. Valluvan },
title = { Comparative Analysis of Architectures for Intrusion Detection Systems against DoS Attacks in MANETs based on Chi-Square Test },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 4 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number4/15198-3580/ },
doi = { 10.5120/15198-3580 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:05:04.797444+05:30
%A A. Anna Lakshmi
%A S. Anandkumar
%A G. Nagarajan
%A K. R. Valluvan
%T Comparative Analysis of Architectures for Intrusion Detection Systems against DoS Attacks in MANETs based on Chi-Square Test
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 4
%P 27-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Adhoc Network (MANET) is a group of wireless nodes that can be dynamically organized as a multi-hop packet radio network without using any existing infrastructure or centralized administration. MANETs are susceptible to the variety of attacks that threaten their operation and the provided services. MANET is severely affected by Denial of Service (DoS) attacks which become a problem for internet users. Intrusion Detection System (IDS) may act as defensive mechanism which monitors network activities in order to detect malicious activities performed by intruders and initiate proper response to malicious activity. Several IDS architectures are proposed for detecting the malicious node. In this paper the following IDS architectures for DoS attack in MANET are compared based on Chi-Square test: i)Stand-alone ii)Cooperative iii)Hierarchical iv)Zone based approach using mobile agent. Also listed out the strengths and weaknesses of each IDS architecture. A cluster based cooperative and distributed IDS which uses multiple light weight agents and reduces the overhead of cluster head is proposed. Simulations based on NS2 are as shown.

References
  1. I. Chlamtac, M. Conti, N. Liu, Mobile ad hoc networking: imperatives and challenges, Adhoc networks, Vol. 1, no. 1, pp. 13-64,2003.
  2. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, Security in mobile adhoc networks: Challenges and solutions, IEEE wireless communications, Vol. 11, no. 1, pp. 38-47, 2004.
  3. Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis, A comparative evaluation of intrusion detection architectures for mobile ad hoc networks, Elsevier, pp. 63-80, 2010.
  4. A. Mishra, K. Nadkarni, A. Patcha, Intrusion Detection in Wireless Ad hoc Networks, IEEE Wireless Communications, Vol. 11, Issue 1, PP. 48-60, 2004.
  5. Fei Xing Wenye Wang ,Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks, Military Communications Conference, 2006. MILCOM ,IEEE.
  6. International, 2001. Safdar Ali Soomro, Sajjad Ahmed Soomro, Abdul Ghafoor Memon, Abdul Baqi, Denial of Service Attacks in Wireless Ad hoc Networks, Journal of Information & Communication Technology, Vol. 4, 2010.
  7. XiaoxinWu, Beijing, DavidK. Y. Yau, Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering:A Game-theoretic Approach, ASIACCS'07, 2007.
  8. Adnan Nadeem, Michael Howarth, Adaptive Intrusion Detection & Prevention of Denial of Service attacks in MANETs, ACM, 2009.
  9. Prajeet Sharma, Niresh Sharma, Rajdeep Singh, A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network, International Journal of Computer Applications, Volume 41, No. 21, 2012.
  10. Rahul Rastogi, Zubair Khan, M. H. Khan, Network Anomalies Detection Using Statistical Technique: A Chi- Square approach, International Journal of Computer Science, Vol 9, 2012.
  11. N. Ye and Q. Chen, An Anomaly Detection Techniques based on a CHI-SQUARE Statistics for Detecting Intrusion into Information System, Quality and Reliability Engineering, 2001.
  12. T. Anantvalee, J. Wu, A survey on intrusion detection in mobile adhoc networks, Wireless/mobile network security, Springer, Chapter 7, pp. 170-196,2006.
  13. V. G. Jecheva, E. P. Nikolova, An Adaptive Approach to Anomaly Intrusion Detection Based on Data Mining and String Metrics, International Review on Computers and Software, 2008
  14. Y. Zhang, W. Lee, Y. Huang, Intrusion Detection Techniques for Moble Wireless Networks, ACM WINET, Vol. 9, No. 5, 2003.
  15. Farhan A. F. , Zulkhairi D. , M. T. Hatim, Mobile Agent Intrusion Detection System For Mobile Ad Hoc Networks: A Non-overlapping Zone Approach , IEEE/IFIP, ICI 2008.
  16. S. S. Chopade, Prof. N. N. Mhala, A Co-Operative Intrusion Detection System in MobileAdHocNetwork, International Journal of Computer Applications,Volume 18, 2011.
  17. B. Pahlevanzadeh, S. A. Hosseini Seno, T. C. Wan, R. Budiarto, Mohammed M. Kadhum, A Cluster-Based Distributed Hierarchical IDS for MANETs
  18. B. Sun, K. Wu, U. W. Pooch, Alert Aggregation in Mobile AdHoc Networks, WiSe'03 and MobiCom'03, pp. 69-78, 2003.
  19. Farhan Abdel-Fattah, Zulkhairi Md. Dahalin, Shaidah Jusoh, Distributed and Cooperative Hierarchical Intrusion Detection on MANETs, International Journal of Computer Applications, Volume 12, No. 5, 2010.
  20. NS-2 Simulator. URL: http:// www. isi. edu / nsnam/ns.
Index Terms

Computer Science
Information Sciences

Keywords

MANET DoS attack Intrusion Detection System IDS architecture Chi-square test