scispace - formally typeset

Proceedings ArticleDOI

Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol

01 Oct 2013-pp 929-935

TL;DR: A cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system is proposed.

AbstractMobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system. This system is able to identify different types of behaviors of a misbehaving node like suspicious, malicious but not intrusive and both malicious & intrusive. Simulation result shows the effectiveness of our proposal.

...read more


Citations
More filters
Journal ArticleDOI
TL;DR: The proposed consolidated approach, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network, which enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency.
Abstract: The feature of Dynamic topology configuration of MANET reciprocates the security constraints and bring in many security threats that hamper the routing and time bound delivery of packets. Many security schemes had been proposed to secure MANET routing and improve its efficiency. The solutions proposed by existing systems are defined in one dimension so that the targeted attack can be fixed up, but that might create flaws in other dimension or introduce new attack. So it is necessary to create a multidimensional solution that empowers the routing process to become inherently secure rather than defending one particular attack. The selfish or maliciously behaving nodes in the network are the key players in launching the attacks and disrupting the routing process. In this paper, the proposed consolidated approach named, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network. This enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency. Even though the malicious nodes are isolated, the proposed method allows them to be sender for transmitting their own data, but under controlled environment defined by IDS so that the attempt to launch DOS attack can be avoided. The reconsideration of isolated node that to under controlled IDS environment in collaboration with Trust and improved ACK based scheme is key behind proposed multidimensional method, ITCA. Further the method is integrated with AODV and extensive experimentation is done based on raising number of malicious nodes in the network to measure its effectiveness and efficiency.

7 citations

01 Jan 2018
TL;DR: The following lists the main characters from the film version of The God of Small Things, which was released in cinemas around the world in 2016.
Abstract: Error! Bookmark not defined. List of Tables vii List of Figures viii

3 citations

Proceedings ArticleDOI
01 Apr 2016
TL;DR: The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network and previously proposed approaches that plays a major role for enhancing the performance of D SR routing protocol.
Abstract: Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network. This paper presents the literature review of DSR routing protocol and previously proposed approaches that plays a major role for enhancing the performance of DSR routing protocol. The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network.

1 citations


Cites background from "Cooperative network intrusion detec..."

  • ...When first route sends reply packet to the source at that time the verification packet is generated....

    [...]


References
More filters
Proceedings ArticleDOI
01 Aug 2000
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Abstract: This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured behavior. We use a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes. Through simulation we evaluate watchdog and pathrater using packet throughput, percentage of overhead (routing) transmissions, and the accuracy of misbehaving node detection. When used together in a network with moderate mobility, the two techniques increase throughput by 17% in the presence of 40% misbehaving nodes, while increasing the percentage of overhead transmissions from the standard routing protocol's 9% to 17%. During extreme mobility, watchdog and pathrater can increase network throughput by 27%, while increasing the overhead transmissions from the standard routing protocol's 12% to 24%.

3,697 citations


"Cooperative network intrusion detec..." refers background in this paper

  • ...In watchdog and path rater system [1] [2] by Marti, Giuli, and Baker, underlying routing protocol being...

    [...]

Book ChapterDOI
26 Sep 2002
TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Abstract: Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. We suggest a generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior. Each network entity keeps track of other entities’ collaboration using a technique called reputation. The reputation is calculated based on various types of information on each entity’s rate of collaboration. Since there is no incentive for a node to maliciously spread negative information about other nodes, simple denial of service attacks using the collaboration technique itself are prevented. The generic mechanism can be smoothly extended to basic network functions with little impact on existing protocols.

1,727 citations


"Cooperative network intrusion detec..." refers background in this paper

  • ...CORE (Collaborative Reputation mechanism) [4] by Michiardi and Molva, is based on a monitoring system and a reputation system, uses both direct and indirect reputation....

    [...]

Proceedings ArticleDOI
09 Jun 2002
TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Abstract: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However,it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or reported routing and forwarding behavior of other nodes. The detailed implementation of CONFIDANT in this paper assumes that the network layer is based on the Dynamic Source Routing (DSR) protocol. We present a performance analysis of DSR fortified by CONFIDANT and compare it to regular defenseless DSR. It shows that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network. All simulations have been implemented and performed in GloMoSim.

1,557 citations

Proceedings Article
01 Jan 2002
TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Abstract: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or reported routing and forwarding behavior of other nodes. The detailed implementation of CONFIDANT in this paper assumes that the network layer is based on the Dynamic Source Routing (DSR) protocol. We present a performance analysis of DSR fortified by CONFIDANT and compare it to regular defenseless DSR. It shows that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network. All simulations have been implemented and performed in GloMoSim.

1,183 citations


"Cooperative network intrusion detec..." refers background in this paper

  • ...There are also some reputation based schemes like CONFIDANT (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks) [3] by Buchegger and LeBoudec where reputation and hence the rating of a monitored node is used to detect its misbehavior....

    [...]

Posted Content
TL;DR: OCEAN is found that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges, and could possibly help obviate solutions requiring trust-management for some contexts.
Abstract: Ad hoc networks rely on the cooperation of the nodes participating in the network to forward packets for each other. A node may decide not to cooperate to save its resources while still using the network to relay its traffic. If too many nodes exhibit this behavior, network performance degrades and cooperating nodes may find themselves unfairly loaded. Most previous efforts to counter this behavior have relied on further cooperation between nodes to exchange reputation information about other nodes. If a node observes another node not participating correctly, it reports this observation to other nodes who then take action to avoid being affected and potentially punish the bad node by refusing to forward its traffic. Unfortunately, such second-hand reputation information is subject to false accusations and requires maintaining trust relationships with other nodes. The objective of OCEAN is to avoid this trust-management machinery and see how far we can get simply by using direct first-hand observations of other nodes' behavior. We find that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges. This encouraging result could possibly help obviate solutions requiring trust-management for some contexts.

410 citations


"Cooperative network intrusion detec..." refers background in this paper

  • ...OCEAN (Observation-based Cooperation Enforcement in Ad hoc Networks) [5] by Bansal & Baker, is also based on a reputation scheme, relies only on its own observation to avoid the new vulnerability of false accusation due to the use of second-hand reputation exchanges....

    [...]