An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes

@article{Singh2017AnII,
  title={An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes},
  author={Opinder Singh and Jay P. Singh and Ravinder Singh},
  journal={Indian journal of science and technology},
  year={2017},
  volume={10},
  pages={1-12}
}
Objectives: Mobile Adhoc Networks (MANETs) due to their dynamic topology are more liable to have security problems. These Adhoc Networks are easily susceptible to various types of attacker nodes. Out of the numerous attacks black hole, flooding and selective packet drop attacks are more hazardous attacks which reduce the performance of network under various parameters. Due to this problem, there is a need to develop a new approach for mitigating these attacker nodes simultaneously to improve… 

Figures and Tables from this paper

FUZZY BASED MALICIOUS NODES DETECTION IN MOBILE AD-HOC NETWORKS
TLDR
A Fuzzy based detection system that detects different MANETs attacks is proposed that makes use of cluster based architecture to properly organize the nodes in the network and uses concept of anomaly detection and misuse detection that is based on fuzzy rule sets.
A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks
TLDR
A Smart approach for intrusion detection and prevention system (SA-IDPS) to mitigate attacks in MANET by machine learning methods is proposed and experiments are conducted and tested for evaluating the performance of proposed SA- IDPS scheme.
Enhanced TWOACK based AODV protocol for intrusion detection system
TLDR
A new intrusion detection protocol, called E-TwoAck scheme, is proposed, which does not discard the route when a malicious node is detected rather it sends the data packet twice again on the same route and waits for an acknowledgment.
A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN
TLDR
This paper proposes a Novel Hybrid and Secure Clustering Black hole Attack Mitigation Technique in Wireless LAN and proves that this technique effectively detects the black hole attack in terms of throughput, packet loss, end to end packet delivery ratio, delay.
Secure routing in mobile Ad hoc networks: a predictive approach
TLDR
A proactive predictive approach to mitigate sequence number attacks which discovers misbehaving nodes during route discovery phase is proposed and suggests modifications in Ad hoc on-demand distance vector (AODV) routing protocol.
Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET
TLDR
A trust factor and fuzzy based intrusion detection and prevention system is proposed for routing and an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm and Particle swarm Optimization for the optimal path selection in order to provide secure routing.
Novel Secured Keys Generation (NSEKG) with User Property based Artificial Bee Colony (UPABC) for IDPS in MANET
  • B. Ananthi, S. Sutha
  • Computer Science
    International Journal of Engineering and Advanced Technology
  • 2019
TLDR
This work proposes the secure routing using Novel SEcured Keys Generation (NSEKG) against IDPS system, which is very effective for communication attacks and needs to be gradually improved in order to detect multiple attacks.
Construing Attacks of Internet of Things (IoT) and A Prehensile Intrusion Detection System for Anomaly Detection Using Deep Learning Approach
TLDR
This paper has developed an algorithm by using deep learning approach to dispute attacks and give security to the user that recuperates from attacks like DoS, DDoS, R2L, U2R, and probe attack on the security of home-based appliances.
A REVIEW SECURE ROUTING TECHNIQUE FOR MANETS
TLDR
The jelly fish is the active type of attack which reduce network performance and in this paper various secure routing techniques are reviewed and discussed.
Pilot Subcarrier Based Channel Estimation in OFDM System
TLDR
An algorithm for mapping 4-bit pilot bits into gray- coded complex constellation and a technique to insert gray-coded complex pilot symbols into OFDM stream before transmission for proper channel estimation are proposed.
...
...

References

SHOWING 1-10 OF 51 REFERENCES
A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET
TLDR
A hybrid approach is given for intrusion detection by removing malicious nodes during the route discovery process and increases the network performance in terms of PDR, throughput and end to end delay and security also.
A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks
TLDR
A survey of the main types of attack at the network layer, and a review of intrusion detection and protection mechanisms that have been proposed in the literature are presented.
A modified algorithm to improve security and performance of AODV protocol against black hole attack
TLDR
A new algorithm is suggested which enhances the security of AODV routing protocol to encounter the black hole attacks and tries to identify malicious nodes according to nodes’ behaviours in an Ad Hoc network and delete them from routing.
A novel approach for mitigating gray hole attack in MANET
TLDR
The proposed mechanism for mitigating the impact of smart gray hole attack uses several special nodes called as G-IDS (gray hole-intrusion detection system) nodes which are deployed in MANETs for detecting and preventing smartgray hole attack.
EAACK—A Secure Intrusion-Detection System for MANETs
TLDR
This paper proposes and implements a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs, which demonstrates higher malicious-behavior-detected rates in certain circumstances while does not greatly affect the network performances.
Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol
TLDR
An algorithm is presented in this paper to detect the presence of the SYN flooding attack at an early stage and finds such malicious nodes which try to affect the multimedia communication in MANETs by introducing unnecessary delays.
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
TLDR
This paper proposes an enhanced trust mechanism to detect malicious insiders and identifies their victims by introducing a selective forwarding-based denial-of-service (DoS) attack and introduces a prevention routing algorithm that proactively prevents the attack.
Grayhole Attack and Prevention in Mobile Adhoc Network
TLDR
In Network Simulation-2 (NS-2) scenario the simulation result has shown that the throughput packet delivery is improved rather than traditional Gray hole attack.
Traffic Flooding Attack Detection on SNMP MIB Using SVM
TLDR
A lightweight and fast detection mechanism for traffic flooding attacks using SNMP MIB statistical data gathered from SNMP agents and a machine learning approach based on a Support Vector Machine for attack classification is proposed.
...
...