CFP last date
20 December 2024
Reseach Article

An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks

Published on May 2013 by Hemant Sonawane, Hitesh Gupta
International Conference on Recent Trends in Engineering and Technology 2013
Foundation of Computer Science USA
ICRTET - Number 1
May 2013
Authors: Hemant Sonawane, Hitesh Gupta
0e49d7cf-6307-4227-8ea2-ce9914a2ad27

Hemant Sonawane, Hitesh Gupta . An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks. International Conference on Recent Trends in Engineering and Technology 2013. ICRTET, 1 (May 2013), 33-36.

@article{
author = { Hemant Sonawane, Hitesh Gupta },
title = { An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks },
journal = { International Conference on Recent Trends in Engineering and Technology 2013 },
issue_date = { May 2013 },
volume = { ICRTET },
number = { 1 },
month = { May },
year = { 2013 },
issn = 0975-8887,
pages = { 33-36 },
numpages = 4,
url = { /proceedings/icrtet/number1/11765-1315/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Engineering and Technology 2013
%A Hemant Sonawane
%A Hitesh Gupta
%T An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks
%J International Conference on Recent Trends in Engineering and Technology 2013
%@ 0975-8887
%V ICRTET
%N 1
%P 33-36
%D 2013
%I International Journal of Computer Applications
Abstract

Mobile ad hoc network (MANET) is rapidly deployable, self configuring network able to communicate with each other without the aid of any centralized system. There is no need for existing infrastructure base network. In MANET Wireless medium is radio frequencies and nodes are mobile, topology can be very dynamically. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks like internet. Multihop operation of MANET requires a routing mechanism designed for mobile nodes are internet access mechanisms, self configuring networks requires an address allocation mechanism, mechanism to detect and act on, merging of existing networks and security mechanisms. As we know that there is no any centralized system so routing is done by node itself. Due to its mobility and self routing capability nature, there are many weaknesses in its security. Therefore Intrusion Detection System (IDS) uses anomaly based detection and signature based detection schemes for detection of Distributed Denial-of-Service (DDoS) attacks found on the wireless ad hoc network.

References
  1. Prajeet Sharma, Niresh Sharma and Rajdeep Singh. "A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network" International Journal of Computer Applications March 2012.
  2. H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, Security in Mobile Ad hoc Networks: Challenges and Solutions, IEEE Wireless Communications. February 2004.
  3. Adam Burg, "Seminar on Ad Hoc Network Specific Attacks".
  4. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, "An Overview of Mobile Ad Hoc Networks: Applications and Challenges", 2005.
  5. S. A. Arunmozhi, Y. Venkataramani "DDoS Attack and Defense Scheme in Wireless Ad-hoc Networks" International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011.
  6. Christine Dartigue, Hyun Ik Jang, and Wenjun Zeng, "A New Data-Mining Based Approach for Network Intrusion Detection".
  7. Jelena Mirkovic, Max Robinson, Peter Reiher, George Oikonomou, "Distributed Defense Against DDoS Attacks".
  8. Intrusion Detection System, Information Assurance Tools Report 2009.
  9. Network Simulator- ns-2. http://www. isi. edu/ nsnam /ns/.
  10. www. chicory. stanford. edu/satyaki/research/AodvRouting. html
  11. http://www. moment. cs. ucsb. edu/AODV/aodv. html
  12. Tao Lin, "Mobile Ad-hoc Network Routing Protocols: Methodologies and Applications", Ph. D. Dissertation, Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Virginia, 2004.
  13. Adam Burg, "Seminar on Ad Hoc Network Specific Attacks".
  14. Cryptography and Network Security by William Stallings – 4th Edition Pearson education.
  15. Cryptography and Network Security by Behrouz Forouzan McGraw-Hill publication.
  16. www. wirelessdefence. org.
  17. http://sectools. org/ - various security tools.
  18. http://www. google. co. in.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Ddos Digital Signature Aodv Syn Flood Intrusion Detection System