This document discusses improving the performance of intrusion detection systems (IDS) in mobile ad hoc networks (MANETs). It proposes using an inverted table approach to track communication information and identify attacker nodes through data mining. The key approaches are:
1. Maintaining an inverted table to record network communication information for analysis.
2. Using data mining techniques like anomaly detection to identify attacker nodes based on patterns in the table.
3. Discovering preventative paths that avoid identified attacker nodes to improve network throughput and reduce data loss.
The approaches aim to improve IDS performance challenged by attacks that slow detection in MANETs. The work will be implemented in NS2 and evaluate performance based on throughput and
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
Mobile ad-hoc network security problems are the subject of in depth analysis. A group of mobile nodes area unit connected to a set wired backbone. In MANET, the node themselves implement the network management in a very cooperative fashion. All the nodes area unit accountable to create a constellation that is dynamically, modification it and conjointly the absence of any clear network boundaries. We tend to project a completely unique intrusion detection model for mobile ad-hoc network victimization. CP-KNN (Conformal Prediction K-Nearest Neighbor) algorithmic rule is to classify the audit knowledge for anomaly detection. The non-conformity score worth is employed to cut back the classification period of time for multi level iteration. It is effectively notice anomalies with high true positive rate, low false positive rate and high confidence that the progressive of assorted anomaly detection ways. Additionally it is interfered
by “noisy” knowledge (unclean data), the projected technique is strong, effective and conjointly it retains
its smart detection performance and to avoid the abnormal activity.
We are sending data from source node to destination using wireless sensor networks (WSNs), In wireless sensor networks, it is a typical threat to source privacy that an attacker performs back tracing strategy to locate source nodes by analyzing transmission paths. So there is lot of chances to lose data and information theft by network hackers. Network hackers performs eves dropping, sniffers attack, Denial of service attack. These types of attacks are achieved by negative commands generated by intermediate server maintained by hackers. With the popularity of the Internet of Things (IoTs) in recent years, source privacy protection has attracted a lot of attentions. However, they fail to get the tradeoff between multi-path transmission and transmission cost. In this project, we propose a Constrained Random Routing (CRR) mechanism and Greedy techniques, which can constantly change routing next-hop instead of a relative fixed route so that attackers cannot analyze routing and trace back to source nodes. At first we designed the randomized architecture for each sensor nodes. Then calculate the coordinates and weights of node, Finally, the selected weights help to decide which node will become the next hop. In this way, attackers would be confused by the constantly changing paths. The simulation results prove that our proposal can achieve high routing efficiency in multi-path transmission. A Prasanth | P Sankar Ganesh | S P Raja Gopalan"Data Prevention from Network Hacking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11035.pdf http://www.ijtsrd.com/engineering/computer-engineering/11035/data-prevention-from-network-hacking/a-prasanth
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
Mobile ad-hoc network security problems are the subject of in depth analysis. A group of mobile nodes area unit connected to a set wired backbone. In MANET, the node themselves implement the network management in a very cooperative fashion. All the nodes area unit accountable to create a constellation that is dynamically, modification it and conjointly the absence of any clear network boundaries. We tend to project a completely unique intrusion detection model for mobile ad-hoc network victimization. CP-KNN (Conformal Prediction K-Nearest Neighbor) algorithmic rule is to classify the audit knowledge for anomaly detection. The non-conformity score worth is employed to cut back the classification period of time for multi level iteration. It is effectively notice anomalies with high true positive rate, low false positive rate and high confidence that the progressive of assorted anomaly detection ways. Additionally it is interfered
by “noisy” knowledge (unclean data), the projected technique is strong, effective and conjointly it retains
its smart detection performance and to avoid the abnormal activity.
We are sending data from source node to destination using wireless sensor networks (WSNs), In wireless sensor networks, it is a typical threat to source privacy that an attacker performs back tracing strategy to locate source nodes by analyzing transmission paths. So there is lot of chances to lose data and information theft by network hackers. Network hackers performs eves dropping, sniffers attack, Denial of service attack. These types of attacks are achieved by negative commands generated by intermediate server maintained by hackers. With the popularity of the Internet of Things (IoTs) in recent years, source privacy protection has attracted a lot of attentions. However, they fail to get the tradeoff between multi-path transmission and transmission cost. In this project, we propose a Constrained Random Routing (CRR) mechanism and Greedy techniques, which can constantly change routing next-hop instead of a relative fixed route so that attackers cannot analyze routing and trace back to source nodes. At first we designed the randomized architecture for each sensor nodes. Then calculate the coordinates and weights of node, Finally, the selected weights help to decide which node will become the next hop. In this way, attackers would be confused by the constantly changing paths. The simulation results prove that our proposal can achieve high routing efficiency in multi-path transmission. A Prasanth | P Sankar Ganesh | S P Raja Gopalan"Data Prevention from Network Hacking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11035.pdf http://www.ijtsrd.com/engineering/computer-engineering/11035/data-prevention-from-network-hacking/a-prasanth
Qualitative Chemistry Education: The Role of the TeacherIOSR Journals
Abstract: This paper discussed the role of a chemistry teacher towards improving the quality of education in Nigeria. The decline in the quality of education has been attributed to many factors. Some of these factors are unqualified teachers, examination malpractice,, lack of practical skills, method of classroom instruction, to mention but a few. The role of a chemistry teacher among others is to change the method of classroom instruction from lecture method to innovative learning strategy such as cooperative learning and concept mapping, and to make use of improvised materials in the absence of standard equipments . It also examine the problems associated with the fall in quality of education. Finally it is recommended that Government should ensure that adequate funds are released to train science teachers, since teachers are the main determinant of quality in Education.
Role of soluble urokinase plasminogen activator receptor (suPAR) as prognosis...IOSR Journals
Biological marker suPAR was used in many pathological conditions, including infection. suPAR
was correlated with the severity of sepsis. The purpose of this study to determine levels of suPAR infants with
risk of infection as a prognostic indicator for sepsis. Groups of infants with the risk of infection (n = 43) were
followed prospectively on days 0, 3rd and 7th and observed for the incidence of sepsis compared to the control
group (n = 10). suPAR was measured by ELISA and the course of infection measured by clinical criteria.
Results suPAR day 0, 3 and 7, displayed in the form of bloxpot and AUC as prognostic power. suPAR control
levels 9.32 ng / mL, sepsis cutoff 15, 41 ng / mL and AUC of 80.3% [95% CI 65.7%, 94.9%, p = 0.00]. Graph
shows ROC AUC sepsis suPAR day 0, the 3rd and 7th respectively 61.9%, 66.6% and 94.4%. Sepsis with
improved output 16.53 ng / mL and worsening 22.19 ng / mL and AUC of 80.8% [95% CI (0.62 to 0.99), p =
0.02]. suPAR levels was increased in neonatal sepsis patients. suPAR could be used as a prognostic factor for
neonatal sepsis.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
Alinteri Journal of Agriculture Sciences The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments. Is being published online biannually as of 2007.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Similar to A New Approach for Improving Performance of Intrusion Detection System over MANET (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
A New Approach for Improving Performance of Intrusion Detection System over MANET
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 01-09
www.iosrjournals.org
www.iosrjournals.org 1 | Page
A New Approach for Improving Performance of Intrusion
Detection System over MANET
1
Kusum Nara, 2
Aman Dureja
1
Student, Computer Science and Engineering Deptt, PDM College of Engineering, Bahadurgarh, Haryana
(India)
2
Asst. Prof, PDM College of Engineering, Bahadurgarh, Haryana (India)
Abstract: A Mobile Ad-hoc Network (MANET) is one of the busy and public networks; Because of this the
network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present
that falsely claim itself as a valid node. It will accept the information and will not forward the information to
next nodes. Intrusion Detection System (IDS) will be used to detect such kind of attacks, but these attacks slows
down the performance of IDS. To improve the performance of IDS and to handle these attacks we have
presented an attack avoidance scheme. In which a preventive path will be discovered in which not attacker node
will be covered. The detected path may be wider than the shortest path but will provide the higher throughput
and reduce the data loss over the network. In our present work we record an interconnection table to track the
communication information over the network. The INVERTED TABLE APPROACH will be used to maintain
this table. Once the table will be defined, the DATA MINING APPROACH will be used to identify the attacker
nodes. The work will be implemented in NS2.35 and the result analysis will be driven based on throughput and
the loss analysis.
Keywords: Mobile Ad-Hoc Network (MANET), routing protocol, Black Hole Attack, AODV.
I. Introduction
A Mobile ad hoc network is a group of wireless mobile computers (or nodes);in which nodes
collaborate by forwarding packets for each other to allow them to communicate outside range of direct wireless
transmission. Ad hoc networks require no centralized administration or fixed network infrastructure such as base
stations or access points, and can be quickly and inexpensively set up as needed.A MANET is an autonomous
group of mobile users that communicate over reasonably slow wireless links. The network topology may vary
rapidly and unpredictably over time, because the nodes are mobile. The network is decentralized, where all
network activity, including discovering the topology and delivering messages must be executed by the nodes
themselves. Hence routing functionality will have to be incorporated into the mobile nodes.
II. System Architecture of MANET:-
In our architecture, one or more pre-defined nodes act as a group controller (GC), which is trusted by
all the group nodes. A GC has authority to assign resources to the nodes in MANET. This resource allocation is
represented as a Key Note style credential (capability) called policy token, and it can be used to express the
services and the bandwidth a node is allowed to access. They are cryptographically signed by the GC, which can
be verified any node in the MANET. When a node (initiator) requests a service from another MANET node
(responder) using the policy token assigned to the initiator, the responder can provide a capability back to the
initiator. This is called a network capability, and it is generated based on the resource policy assigned to the
responder and its dynamic conditions. Figure gives a brief overview of our system. All nodes in the path
between an initiator to a responder (i.e., nodes relaying the packets) enforce and abide by the resource allocation
encoded by the GC in the policy token and the responder in the network capability. The enforcement involves
both accessibility and bandwidth allocation. A responder accepts packets (except for the first one) from an
initiator only if the initiator has authorization to send, in the form of a valid network capability. It accepts the
first packet only if the initiator’s policy token is included. An intermediate node will forward the packets from a
node only if the packets have an associated policy token or network capability, and if they do not violate the
conditions contained therein. Possession of a network capability does not imply resource reservation; they are
the maximum limits a node can use. Available resources are allocated by the intermediate nodes in a fair
manner, in proportion to the allocations defined in the policy token and network capability.
The capability need not be contained in all packets. The first packet carries the capability, along with a
transaction identifier (TXI) and a public key. Subsequent packets contain only the TXI and a packet signature
based on that public key. Intermediate nodes cache policy tokens and network capabilities in a capability
database, treating them as soft state. A capability database entry contains the source and destination addresses,
TXI, the capability, public key for the packet signature and packet statistics
2. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 2 | Page
Fig... MANET System Architecture
1.1 Key Issues in MANETs
Many issues can be addressed in the context of MANETs. Here some important issues are presented that have
dominated the field of research since the evolution of MANETs.
A. Static Datasets
In MANET, the mining work is generally performed on a static confined datasets. In this the support and
confidence values are defined statically.
B. Ineffectiveness
The existing work is ineffective if two malicious nodes will build the path and perform a fake
communication.
C. Cooperativeness
MANET routing protocols are usually highly cooperative. This can make them the target of new attacks.
For example, a node can pose as a neighbour to the other nodes and participate in decision mechanisms,
possibly affecting significant parts of the network.
D. Mobility
MANET nodes can leave and join the network and move independently, so the network topology can
change frequently. The highly dynamic operation of a MANET can cause traditional techniques of IDS to
be unreliable.
E. Lack of Central Points
MAMANETs do not have any entry points such as routers, gateways, etc. These are typically present in
wired networks and can be used to monitor all network traffic that passes through them. A node of a mobile
ad hoc network can see only a portion of a network: the packets it sends or receives together with other
packets within its radio range. Since wireless ad hoc networks are distributed and cooperative, the intrusion
detection and response systems in MANETs may also need to be distributed and cooperative and this leads
to some difficulties.
2. Related Work
Xiao Yang Zhang performed a work," Proposal of a Method to Detect Black Hole Attack in MANET".
Author propose a new detection method based on checking the sequence number in the Route Reply message by
making use of a new message originated by the destination node and also by monitoring the messages relayed
by the intermediate nodes in the route. Computer simulation results demonstrate that Presented method has a
feature of much lower false positive and negative rates in detecting any number of malicious nodes than the
conventional methods.
After Xiao Yang Zhang , Satoshi Kurosawa performed a work," Detecting Black hole Attack on
AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method" in 2007. The Author analyzes the black
hole attack which is one of the possible attacks in ad hoc networks. In this paper, Author proposes an anomaly
detection scheme using dynamic training method in which the training data is updated at regular time intervals.
The simulation results show the effectiveness of Presented scheme compared with conventional scheme.
In Year 2009, Mehdi Kargar performed a work," Truthful and Secure Routing in Ad Hoc Networks
with Malicious and Selfish Nodes". Author study routing in ad hoc and wireless networks from a game theoretic
3. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 3 | Page
view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for
forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. In this
work, Author considers that the network consists of malicious nodes too.
After Mehdi Kargar,Athira.M.Nambiar performed a work,” Wireless Intrusion Detection Based on
Different Clustering Approaches” in 2010. The Author finding optimal set of features from collected WLAN
data using a Ranking Algorithm technique. Then with the aid of different data mining techniques such as K-
Means, self organizing map and decision tree, these features are analyzed and the performance comparison is
carried out.
After Athira.M.Nambiar,Rajib Das performed a work," Security Measures for Black Hole Attack in
MANET: An Approach" in the year 2011. The Author gives an algorithmic approach to focus on analyzing and
improving the security of AODV, which is one of the popular routing protocols for MANET. Presented aim is
on ensuring the security against Black hole attack. The proposed solution is capable of detecting & removing
Black hole node(s) in the MANET at the beginning.
In Year 2012, SaurbhGoyalperformed a work," An Improved Inverted table Approach to Detect Selfish
Node In Mobile Ad Hoc Network" after Rajib Das. Authors have to find the frequency of different node and
group nodes over the network. To perform the frequency analysis the improved Inverted table will be used. As
the selfish node will be identified the network throughput will be improved.
III. Approaches Used
A number of different approaches have been used to detect and remove malicious nodes. We will use
two major approaches to detect and remove the malicious nodes. One is The Inverted Table based approach and
other is Data Mining approach. Inverted Table approach is used to define communication table with improved
information management. Data mining approach is used to identify the black hole and to perform
communication over the safe path.
3.1 Inverted Table Approach
Inverted matrix is the numerical representation of a string. The rows of the matrix represent the various
characters present in the string and are indexed in the order in which they appear in the string. In this proposed
we have taken a sequence. The complete work is divided in three steps:-
i. Identification of Node Sequence
ii. Build the Inverted Table for the Specific Node Sequence.
iii. Frequent Pattern Identification
3.2 Data Mining Approach
There are basically three data mining approaches for detecting malicious nodes. They are:
i. Anomaly-based Intrusion Detection approach
ii. Misuse-based Intrusion Detection approach
iii. Specification-based Intrusion Detection approach
The first technique is anomaly-based intrusion detection approach. Itprofiles the symptoms of normal
behaviors of the system such as usage frequency of commands, CPU usage for programs, and the like. It detects
intrusions as anomalies, i.e. deviations from the normal behavior.
Misuse-based intrusion detection approach compares known attack signatures with current system
activities. It is generally preferred by commercial IDSs since it is efficient and has a low false positive rate. The
drawback of this approach is that it cannot detect new attacks.
The last technique is specification-based intrusion detection approach. In this approach, a set of
constraints on a program or a protocol are specified and intrusions are de-tected as runtime violations of these
specifications. It is introduced as a promising alternative that combines the strengths of anomaly-based and
misuse-based detection techniques and providing detection of known and unknown attacks with a lower false
positive rate. It can detect new attacks that do not follow the system specifications.
IV. Routing Protocols
The primary goal of routing protocols in ad-hoc network is to establish optimal path (min hops)
between source and destination with minimum overhead and minimum bandwidth consumption so that packets
are delivered in a timely manner. A MANET protocol should function effectively over a wide range of
networking context from small ad-hoc group to larger mobile networks.
Classification of routing protocols in mobile ad hoc network can be done in many ways, but most of
these are done depending on routing strategy and network structure. The routing protocols can be categorized as
flat routing, hierarchical routing and geographic position assisted routing while depending on the network
structure. According to the routing strategy routing protocols can be classified as Table-driven and on-demand.
4. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 4 | Page
4.1 flat routing protocols
Flat routing protocols are divided mainly into two classes; the first one is proactive routing (table
driven) protocols and other is reactive (on-demand) routing protocols. One thing is general for both protocol
classes is that every node participating in routing play an equal role. They have further been classified after their
design principles; proactive routing is mostly based on LS (link-state) while on-demand routing is based on DV
(distance-vector).
4.1.1 Pro-Active/Table Driven routing Protocols
Proactive MANET protocols are also called as table-driven protocols and will actively determine the
layout of the network. Through a regular exchange of network topology packets between the nodes of the
network, at every single node an absolute picture of the network is maintained. There is hence minimal delay in
determining the route to be taken.
4.1.2 Reactive (On Demand) protocols
Portable nodes- Notebooks, palmtops or even mobile phones usually compose wireless ad-hoc
networks. This portability also brings a significant issue of mobility. This is a key issue in ad-hoc networks. The
mobility of the nodes causes the topology of the network to change constantly. Keeping track of this topology is
not an easy task, and too many resources may be consumed in signaling. Reactive routing protocols were
intended for these types of environments.
4.2 Hierarchical protocols
These protocols include HSR,ZRP,CGSR,LANMAR protocols.
4.3 Geographic position assisted or Hybrid protocols
Hybrid protocols make use of both reactive and proactive approaches. Example of this type includes
Zone Routing Protocol (ZRP), ZHLS etc.
V. An Overview Of AODV Routing Protocol
Ad hoc On Demand Distance Vector Routing (AODV)
Ad hoc On-Demand Distance Vector (AODV) routing is a routing protocol for mobile ad hoc networks and
other wireless ad-hoc networks. It is jointly developed in Nokia Research Centre of University of California,
Santa Barbara and University of Cincinnati by C. Perkins and S. Das. It is an on-demand and distance-vector
routing protocol, meaning that a route is established by AODV from a destination only on demand. AODV is
capable of both unicast and multicast routing. It keeps these routes as long as they are desirable by the sources.
Additionally, AODV creates trees which connect multicast group members. The trees are composed of the
group members and the nodes needed to connect the members. The sequence numbers are used by AODV to
ensure the freshness of routes. It is loop-free, self-starting, and scales to large numbers of mobile nodes. AODV
defines control messages for route maintenance such as:
RREQ- A route request message is transmitted by a node requiring a route to a node. As an optimization
AODV uses an expanding ring technique when flooding these messages.
Every RREQ carries a time to live (TTL) value that states for how many hops this message should be
forwarded. This value is set to a predefined value at the first transmission and increased at retransmissions.
Retransmissions occur if no replies are received. Data packets waiting to be transmitted (i.e. the packets that
5. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 5 | Page
initiated the RREQ). Every node maintains two separate counters: a node sequence number and a broadcast_ id.
The RREQ contains the following fields
Source Address, Broadcast ID, Source Sequence no., Destination Address, Destination Sequence no., Hop
count.
Whenever a node needs to send a packet to a destination for which it has no ‘fresh enough’ route (i.e., a
valid route entry for the destination whose associated sequence number is at least as great as the ones contained
in any RREQ that the node has received for that destination) it broadcasts a route request (RREQ) message to its
neighbors. Each node that receives the broadcast sets up a reverse route towards the originator of the
RREQ(unless it has a ‘fresher’ one).When the intended destination (or an intermediate node that has a ‘fresh
enough’ route to the destination) receives the RREQ, it replies by sending a Route Reply (RREP). It is important
to notethat the only mutable information in a RREQ and in a RREP is the hop count (which is being
monotonicallyincreased at each hop). The RREP travels back to the originator of the RREQ (this time as a
unicast). At eachintermediate node, a route to the destination is set (again, unless the node has a ‘fresher’ route
than the onespecified in the RREP). In the case that the RREQ is replied to by an intermediate node (and if the
RREQ hadset this option), the intermediate node also sends a RREP to the destination. In this way, it can be
granted that the route path is being set up bi-directionally. In the case that a node receives a new route (by a
RREQ or by a RREP) and the node already has a route ‘as fresh’ as the received one, the shortest one will be up
dated. The source node starts routing the data packet to the destination node through the neighboring node that
firstresponded with an RREP. The AODV protocol is vulnerable to the well-known black hole attack.
Black Hole Attack
The black hole attack is an active insider attack, it has two
properties: first, the attacker consumes the intercepted packets without any forwarding. Second, the node
exploits the mobile ad hoc routing protocol, to advertise itself as having a valid route to a destination node, even
though the route is spurious, with the intention of intercepting packets.
In other terms, a malicious node uses the routing protocol to advertise as having the shortest path to nodes
whose packets it wants to intercept. In the case of AODV protocol, the attacker listens to requests for routes.
When the attacker receives a request for a route to the target node, the attacker creates a reply where an
extremely short route is advertised, if the reply from malicious node reaches to the requesting node before the
reply from the actual node, a fake route has been created. Once the malicious device has been able to insert itself
between the communicating nodes, it is able to do anything with the packets passing between them. It can
choose to drop the packets to form a denial-of-service attack.
Figure: Black Hole Attack
VI. Performance Evaluation
In this section, we concentrate on describing our simulation
Environment and methodology .To implement the above defined work we have used the NS2.35 as the
simulation environment.
A. Network Simulator
NS-2.35 is an open-source simulation tool running on Unix-like operating systems. It is a discreet event
simulator targeted at networking research and provides substantial support for simulation of routing, multicast
protocols and IP protocols, such as UDP, TCP, RTP and SRM over wired, wireless and satellite networks. It has
many advantages that make it a useful tool, such as support for multiple protocols and the capability of
graphically detailing network traffic. Additionally, NS-2.35 supports several algorithms in routing and queuing.
LAN routing and broadcasts are part of routing algorithms. Queuing algorithm includes fair queuing, deficit
round robin and FIFO. NS-2 started as a variant of the REAL network simulator in 1989. REAL is a network
6. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 6 | Page
simulator originally intended for studying the dynamic behavior of flow and congestion control schemes in
packet-switched data networks. In 1995 ns development was supported by Defense Advanced Research Projects
Agency DARPA through the VINT project at LBL, Xerox PARC, UCB, and USC/ISI. The wireless codes from
the UCB Daedelus and CMU Monarch projects and Sun Microsystems have added the wireless capabilities to
ns-2.35.
Simulation Parameters
As already outlined, in this proposed system we will observe the actual throughput in shortest path and
alternate path. Firstly analyze the network detect if there is some misbehaving node based on the current
statistics of receiving packets, forwarding packets and dropping packets. Now the data will be transferred from
some compromising node.
The needed Parameters to carry out the simulation and their corresponding values for both protocols are
specified below:
Simulation Parameters
Parameter Value
Number of Nodes 25
Topography Dimension 1051 x 100
Traffic Type TCP
Radio Propagation
Model
Two-Ray Ground Model
MAC Type 802.11.Mac Layer
Routing Protocol AODV
Antenna Type Omni directional
Simulation in NS2.35
The ad hoc network comprising of 25 nodes is constructed in the NS-2.35 simulator with the use of
ETCL script in the topological boundary area of 1050 m x 100 m. The position of the mobile nodes is defined in
terms of X and Y coordinates values. The given scenario showing the packet transmission with shortest path
between the nodes starting from the source node 0 to the destination node 9.
Figure 1: Placement of Nodes Figure 2: Communication over the network
NS2.35 Overview
The network simulator (NS), which is a discrete event simulator for networks, is a simulated program
developed by VINT (Virtual Internetwork Test-bed) project group. It supports simulations of TCP and UDP,
some of MAC layer protocols, various routing and multicast protocols over both wired and wireless network etc.
Depending on user’s requirement the simulation are stored in trace files, which can be fed as input for analysis
by different component:
A NAM trace file (.nam) is used for the ns animator to produce the simulated environment.
A trace file (.tr) is used to generate the graphical results with the help of a component called X Graph.
When the simulation is finished, the simulation results are produced in one or more text-based output files
that contain detailed simulation data, which can be used to analyze directly or can be used in the graphical user
interface Network Animator (NAM). This graphical user interface shows the simulation result in an easy way.
7. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 7 | Page
The language that is written in NS-2.35 is not only OTcl but also C++. The event scheduler and the basic
network component objects in the data path are written and compiled using C++ to reduce packet and event
processing time.These compiled objects need the OTcl linkage to create a matching OTcl object for each of the
C++ objects to be able to work with OTcl interpreter.
Tool Command Language (Tcl)
Tool Command Language, Tcl is a powerful interpreted programming language developed by John
Ouster out at the University of California, Berkeley. Tcl is a very powerful and dynamic programming language.
It has a wide range of usage, including web and desktop applications, networking, administration, testing etc.
Tcl is a truly cross platform, easily deployed and highly extensible. The most significant advantage of Tcl
language is that it is fully compatible with the C programming language and Tcl libraries can be interoperated
directly into C programs.
Network Animator (NAM)
The biggest advantage of network animator (NAM) is that it provides a graphical user interface (GUI)
for the different simulation environment according to the parameters specified by the user. The Xgraph utility
generates the graphical output of the input data (or trace files).
To animate network traffic in several ways, nam interprets a trace file containing time-indexed network
events, as Figure 3(a) shows. Typically, an ns simulation generates this trace, but nam can also use processing
data from a live network to produce a trace. Nam usually runs offline using traces stored on disk, but it can also
play traces from a running program. The nam trace file contains all information needed for the animation—both
on static network layout and on dynamic events such as packet arrivals, departures, and drops and link failures.
The input file for wireless networking simulations also includes information on node location and movement.
Network Generation
As the work started at the initial work study the required Simulator NS2.35 to start research on it.This
work includes the installation, Environment Setup and basic tutorial study to understand the NS2.35Tcl Script.
As the learning stage finish the next work was to setup the network respective to some defined scenario. The
scenario parameters are given as
Area 1000x1000
Protocols AODV
Simulation time 25 seconds
No of nodes 40
Map size 800mx800m
Max speed 20m/s
Mobility model Random way point
Traffic Type Constant bit rate (CBR)
Packet Size 512 bytes
Figure: 3(a)Figure: 3(b)
8. A New Approach for Improving Performance of Intrusion Detection System over MANET
www.iosrjournals.org 8 | Page
Figure: 3(c) Figure 4: Number of packets Transmitted
Figure 5: Number of packets lost
Figure 6: Bytes Transmitted Figure 7: Bit rate