SlideShare a Scribd company logo
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 7722, ISSN (Print): 2319 – 7714
www.ijhssi.org Volume 2 Issue 6 ǁ June. 2013ǁ PP.42-47
www.ijesi.org 42 | P a g e
Attack Library Based Intrusion Detection System to Secure
Manets
Shashank Kumar Chaudhary 1
,Bramah Hazela 2
(1
Department of computer science and engineering, Amity University, Lucknow, India)
(2
Assistant Professor, Department of computer science and engineering, Amity University, Lucknow, India)
ABSTRACT: A mobile ad hoc network is a wireless network which is also infrastructure less network, these
networks are self-configuring. Due to lack of infrastructure and central management, the security issues are the
important concern. In this paper author have proposed a model which provides certificate based authentication
and attack library based Intrusion detection system. Certificate based authentication helps to establish a secure
connection, whereas attack library based intrusion detection system provide facility to detect the malicious node
present in the network.
KEYWORDS: Dynamic certificate Authority, Intrusion Detection System, mobile ad hoc networks.
I. INTRODUCTION
A mobile ad hoc networks are the wireless network with the collection of mobile nodes. The mobile
nodes are connected in to each other during communication .The mobile nodes in the network can move up to a
range during the communication. The intermediate mobile nodes in the network act as the mobile agent. The
mobile nodes in the MANETs may be with bi-directional or unidirectional links .Each node in the network act
as the router, transmitter or receiver. The mobile nodes operate in the network because they have their individual
battery power.
Fig.1 Mobile ad hoc network.
MANET follows different mobility models according to their temporal and spatial dependencies.
Mobility models used are: random waypoint, random point group mobility and freeway mobility model. Due to
the mobility of nodes the routing protocol performance affected. Due to the rapid growth of mobile gadgets such
as laptop, mobile phones, PDAs etc., MANET become the communication paradigm. Infrastructure network
based on the fixed base station which acts as access point (centralized point). Infrastructure less network are
wireless network, they are self-configuring so there is no centralized access point. MANETs was designed for
military application, natural disasters, data collection and virtual classes. MANETs are categories in two types:
open manet and closed manet. In open manet resources are shared among nodes to achieve different goal. In
closed manet resources are shared among nodes to achieve common goals .Security has become important issue
in the MANETs. Attacks in the adhoc network due to the presence of the malicious node. In this paper, MANET
security issue is tackled, namely to prevent the network from malicious node and to establish a secure
communication between the secure nodes.
II. BACKGROUND
MANET is a self-organizing network of mobile nodes. MANET does not have any fixed topology, due
to dynamic topology it is very difficult task to secure network topology. Several papers focused on the security
issues of the MANET.
D. Sterne, et al. [9], described a architecture for intrusion detection to secure MANET. The architecture
works in hierarchy it collects the detection data from leaves node and flow upward to the root node. To establish
Attack Library Based Intrusion Detection…
www.ijesi.org 43 | P a g e
a secure communication, the hierarchy automatically reconfigured itself based on network topology. A new
intrusion detection system name Enhanced Adaptive Acknowledgement (EAACK) was proposed by U.
Sharmila Begam,et al. [1].
EAACK is able to detect the malicious node based on report of misbehaving node. While detecting malicious
node, the EAACK does not affect network performance. S.Tamilarasan, et al. [5] describe the logical survey to
detect the malicious node based on their behaviour and pattern, and proposed the techniques used for detecting
misbehaving nodes. To establish a trust management by monitoring the other neighbor nodes Reijo Savola [8]
has proposed a model, and also describe the security metrices used in MANET.
III. PROBLEM DOMAIN
In many research work different techniques have been proposed for detecting misbehaving nodes.
Detecting misbehaving node through proposed techniques is a time consuming process. These techniques are
time consuming because they are applied one by one to detect misbehaving node. To overcome this problem
author have proposed an attack library based intrusion detection system. Dynamic certificate authority based
authentication model is proposed to establish a secure communication between the nodes.
IV. BEHAVIORAL CHARACTERISTICS OF NODE IN MANETS
In MANET nodes act as receiver and transmitter within communication range. Source node
communicates to destination node through intermediate nodes present in the network. Attacker aims to attack
the network through these intermediate nodes by making these nodes malicious.
Malicious nodes tend to cause fallowing attacks:
A.) Black-Hole Attack
Fig.2 Black hole attack.
In this attack the malicious node advertise or shows itself, having the shortest path to the destination
node whose packets it wants to hamper. For e.g. in the above figure N2 (malicious node) in the network
advertise itself to have shortest path to the destination node. So N2 node wants to interrupt destination node
packet.
B. Worm-Hole Attack
The attacker creates a tunnel at malicious node so that when malicious node receives a packet it drops the packet
through tunnel.
Fig.3 Worm hole attack.
For e.g. in the above figure the node N4 (Malicious node) creates a tunnel. When node N4 receives a packet
then it drops through the tunnel.
Attack Library Based Intrusion Detection…
www.ijesi.org 44 | P a g e
C. Spoofing Attack
Misbehaving node hires the identity of another node and receives all the packets or messages of that node.
D. Denial of Service
The attacker node exploits the bandwidth of the network .The attacker node (malicious node) generates
unnecessary route requests so that to make network resources unavailable to authentic nodes.
E. Energy Consumption
Mobile nodes in MANETs have limited battery backup. So the mobile nodes save their battery power by
transmitting only necessary data. In this attack, attacker aims to consume the power of battery by routing
unnecessary packets to other nodes.
F. Information Disclosure
In MANETs the data flow in the network in the form of packets. When the data is processed information is
produced. In this attack the attacker attempts to destroy the confidentiality, integrity or availability of the data.
 Attacks on confidentiality:
The attacker aims to disclose the confidential data of the data packet, which is only accessible by the
authorized node.
 Attacks on integrity:
The integrity of the packet is lost. The attacker, alter the data packets by modification and removal of data
packet content.
 Attacks on availability:
In this attack the attacker node routes huge amount of unnecessary traffic to make network resources
unavailable to other nodes.
V. INTRUSION DETECTION SYSTEM (IDS)
In any network intrusion detection system (IDS) monitors activities of both user and program. Intrusion
detection can be done in two ways: Network based intrusion detection and Host based intrusion detection.
Network based intrusion detection runs at the gateway of the network and monitor and captures all the
information about packet that passes through that gateway whereas host based intrusion detection system runs
on the operating system and monitors all the program and event performed by the user or host.
A. Attack Library Based Intrusion Detection System
An attack library is the collection of types and patterns of attacks. Varying components of attack library based
intrusion detection system are as follows:
 Analyzer:
The work of analyzer is to analyze and monitor the node in the network. Analyzer fallows two
methodologies for detection: misuse and anomaly detection.
Misuse detection is based on the pattern, in this detection the node pattern in terms of their event
sequence is monitor. Anomaly detection is based on the behavior monitoring, the node behavior deviations is
compared with normal behavior, if there is change then the analyzer record it.
 Attack Library:
Attack library is a collection of well-organized designed attacks and test cases. It also provides facility
to generate new test cases for new attacks. Attacks are organized in the hierarchy structure. The attack library
uses these patterns and behavior to construct the test cases. The attack library works on a step of designed test
cases. The attack library generates response on the given input. It also generates the UID (unique ID) for the
authentic node. Attack library also monitors the behavior and pattern of directly attached node.
 Certificate Authority:
Certificate authority is the trusted authority that can be used for issuing certificate to make secure
communication .The certificate consists of UID, block signed by certificate authority, Key .UID in the
certificate is generated by the attack library after verification of node that it is not a malicious node.
Attack Library Based Intrusion Detection…
www.ijesi.org 45 | P a g e
Fig.4 Attack Library based intrusion detection system
Steps involved in attack library based intrusion detection system are:
1. Node A activates the analyzer with information to monitor node B.
2. Node A sends a request to node B to establish a communication path.
3. Node B send acknowledgement to node A. Node B send acknowledgement to ensure that he has received
the request. Node B sends a message with acknowledgement whether he wants to establish a connection or
not.
4. Analyzer analyzing Node B during the step-2 & 3. Analyzer sends report of Node B to Node A.
5. Node A sends report and acknowledgement of node B. Node A sends ACK of Node B because it contains
network parameters like response time etc.
6. Attack library response with a message and UID (unique ID) of both nodes A & B. Message contains
information about node B where it is a malicious node or not. The UID is generated by attack library only
when the node is not a malicious node. If it is malicious then Node A broadcast a message in the network
that Node b is malicious. Here attack library monitor node A (direct attached to attack library) after getting
report and acknowledgement of node B. Attack library monitor requesting node (node A) to check it is
malicious or not.
7. Sends UID to certificate authority
VI. DYNAMIC CERTIFICATE AUTHORITY BASED AUTHENTICATION
Fig.5 Dynamic Certificate Authority.
Attack Library Based Intrusion Detection…
www.ijesi.org 46 | P a g e
Dynamic certificate authority is the collection of node UID and its work is to issue certificate to
establish a secure communication between the nodes. The UID is used by certificate authority during issuing
certificate. UID is generated by the attack library during intrusion detection. Due to the concept of attack library
based UID generation only authorized nodes in the network can request for a certificate from certificate
authority. In the above diagram C(A) is certificate of node A, C(B) is certificate of node B, PRath is private key
of certificate authority, T(A) is time stamp for node A certificate, T(B) is the time stamp for node B certificate,
PUa and PUb are the public key of node A and B. Steps involved in Dynamic certificate authority to issue a
certificate are:
1. Node A sends a request to node B to establish a connection.
2. Node B asks for certificate from Node A.
3. Node A send request to certificate Authority to generate certificate of node A and also send public key of A.
4. Certificate authority send certificate to node A which includes UID, Time stamp of node A and public
key of A. The certificate is encrypted by certificate authority using its own private key.
5. Node A receives certificate and decrypt certificate using the public key of certificate authority. Node A
checks for time stamp T (A) to conform that the certificate is not old. Then send C (A) to node B and
request for B certificate.
6. Then node B send request to certificate authority to generate certificate C (B) and also sends his own public
key PUb .
7. Certificate authority generates certificate and encrypt with its own private key and send to node B.
8. Node B decrypts certificate using public key of certificate authority and checks time stamp. Then node B
send certificate C (B) to node A.
After exchanging certificate of each other node A and node B can establish a secure communication.
In proposed model Dynamic certificate Authority the name dynamic is used because the certificate authority
database is transfer to another authentic node present in the network. The certificate authority maintains a
priority list of nodes on the basis of number of times the node has requested for the certificate. The certificate
authority selects that node which has less time requested for certificate because that node power energy backup
is more than the other busy nodes present in network.
Fig.6 Transfer of certificate authority database.
1. Steps involved during the transfer of certificate authority database are:
2. Certificate authority selects the node from priority list to which he wants to transfer the certificate authority
database. After selecting the node certificate authority send request for UID of node X.
3. The node X response to the request and send UID to certificate authority.
4. Certificate authority checks for the UID and conform that the node is authentic or correct one. Then
certificate authority send a message to node X which include that he wants to establish a connection and
attach a time stamp that is used maintain a session for given period of time.
5. Node X sends conformation message.
6. Certificate authority transfer database to node X.
7. Certificate authority update attack library with the UID of new certificate authority.
8. After all these process the Node X acts as the new certificate authority.
Attack Library Based Intrusion Detection…
www.ijesi.org 47 | P a g e
VII. CONCLUSION
This paper focuses on security measures to secure MANETs from attacker. The proposed model which
is based on Attack library based intrusion detection system, helps in detecting the malicious node to secure the
network. Further dynamic certificate authority based authentication model have been proposed which is used to
make an trusted communication between the nodes by using exchanging certificate.
VIII. FUTURE SCOPE
Many research has been done and going on the security of MANET. Moreover the proposed security
model is used to detect the malicious node and to make a secure communication. Our future work will include
the further exploration of attack library i.e. patterns, test cases and to implement the proposed model using
simulator.
IX. ACKNOWLEDGMENT
I would like to thanks Maj. K.K. Ohri (AVSM), Pro.V.C, Amity University, Lucknow Campus. I would
like to further extend my sincere gratitude to Prof. S.T.H. Abdi, Director(ASET) , and Brig. Umesh Chopra,
Deputy Director (ASET), Amity University, Lucknow Campus for their encouragement. I am extremely grateful
to Prof.Deepak Arora, head of computer science and engineering department for this insightful comment. I would
like to express my sincere thanks to Bramah Hazela , Assistant professor , Department of computer science and
engineering ,Amity University Lucknow.
REFERENCES
[1]. U. SharmilaBegam, Dr. G. Murugaboopathi, “A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS” in
International Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1, January 2013.
[2]. DilipVishwakarma, Deepak Chopra, “International Journal of Engineering and Advanced Technology” in Volume-1, Issue-6,
August 2012.
[3]. Mohammed Mujeeb, Sudhakar K N, JitendranathMungara, “Reputation-Based Security Protocol for MANETs” in International
Journal of Innovative Technology and Exploring EngineeringVolume-1, Issue-2, July 2012.
[4]. Chandreyee Chowdhury, SarmisthaNeogy, “SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING
TRUST” in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011.
[5]. S. Tamilarasan and Dr. Aramudan, “A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection
System” in International Journal of Computer 258 Science and Network Security, VOL.11 No.5, May 2011.
[6]. N.Jaisankar, K.DuraiSwamy “A Novel security framework for protecting Network Layer operations in MANET” in International
Journal of Engineering and Technology Vol.1,No.5,December, 2009.
[7]. S. Madhavi, Dr. Tai Hoon Kim, “AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOCNETWORKS” in
International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.
[8]. Reijo Savola, “Node-Level Information Security Monitoring for Mobile Ad Hoc Networks” in Proceedings of the ETRICS'06
Workshop on Security in Autonomous Systems, 2006.
[9]. D. Sterne, P. Balasubramanyam, D. Carman1, B. Wilson, R. Talpade, C. Ko,R. Balupari, C-Y. Tseng2, T. Bowen, K. Levitt and
J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs” in Third IEEE International Workshop on
Information Assurance ,2005.
[10]. RicardoPuttini, Rafael de Sousa, LudovicMé, “Combining Certification-based Authentication and Intrusion Detection toSecure
Manet Routing Protocols” in Proceedings of the European Wireless Conference Mobile and Wireless Systems Beyond 3G ,2004.
[11]. Y. Huang and W. Lee, “A cooperative intrusion detection system for ad hoc networks,” in Proc. ACM Workshop onSecurity in
Ad Hoc and Sensor Networks (SASN'03),October 2003.
[12]. S. Capkun, L. Buttyan, and J. P. Hubaux.“Self-organized public key management for mobile ad hoc networks” in IEEE
Transactions on Mobile Computing, page 17, 2003.

More Related Content

What's hot

Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
ijcsa
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
eSAT Publishing House
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
Affine Analytics
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
IJNSA Journal
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
IJERA Editor
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
IJERA Editor
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
antoniomorancardenas
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
eSAT Publishing House
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
IOSR Journals
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
IJITE
 

What's hot (16)

Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
M026075079
M026075079M026075079
M026075079
 

Similar to G0262042047

A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
IOSR Journals
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
Journal For Research
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
IJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
IAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
IRJET Journal
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
574 501-507
574 501-507574 501-507
574 501-507
idescitation
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
IOSR Journals
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
N44096972
N44096972N44096972
N44096972
IJERA Editor
 

Similar to G0262042047 (20)

A05510105
A05510105A05510105
A05510105
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
M0704071074
M0704071074M0704071074
M0704071074
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
G011123539
G011123539G011123539
G011123539
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
574 501-507
574 501-507574 501-507
574 501-507
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
N44096972
N44096972N44096972
N44096972
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

G0262042047

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 7722, ISSN (Print): 2319 – 7714 www.ijhssi.org Volume 2 Issue 6 ǁ June. 2013ǁ PP.42-47 www.ijesi.org 42 | P a g e Attack Library Based Intrusion Detection System to Secure Manets Shashank Kumar Chaudhary 1 ,Bramah Hazela 2 (1 Department of computer science and engineering, Amity University, Lucknow, India) (2 Assistant Professor, Department of computer science and engineering, Amity University, Lucknow, India) ABSTRACT: A mobile ad hoc network is a wireless network which is also infrastructure less network, these networks are self-configuring. Due to lack of infrastructure and central management, the security issues are the important concern. In this paper author have proposed a model which provides certificate based authentication and attack library based Intrusion detection system. Certificate based authentication helps to establish a secure connection, whereas attack library based intrusion detection system provide facility to detect the malicious node present in the network. KEYWORDS: Dynamic certificate Authority, Intrusion Detection System, mobile ad hoc networks. I. INTRODUCTION A mobile ad hoc networks are the wireless network with the collection of mobile nodes. The mobile nodes are connected in to each other during communication .The mobile nodes in the network can move up to a range during the communication. The intermediate mobile nodes in the network act as the mobile agent. The mobile nodes in the MANETs may be with bi-directional or unidirectional links .Each node in the network act as the router, transmitter or receiver. The mobile nodes operate in the network because they have their individual battery power. Fig.1 Mobile ad hoc network. MANET follows different mobility models according to their temporal and spatial dependencies. Mobility models used are: random waypoint, random point group mobility and freeway mobility model. Due to the mobility of nodes the routing protocol performance affected. Due to the rapid growth of mobile gadgets such as laptop, mobile phones, PDAs etc., MANET become the communication paradigm. Infrastructure network based on the fixed base station which acts as access point (centralized point). Infrastructure less network are wireless network, they are self-configuring so there is no centralized access point. MANETs was designed for military application, natural disasters, data collection and virtual classes. MANETs are categories in two types: open manet and closed manet. In open manet resources are shared among nodes to achieve different goal. In closed manet resources are shared among nodes to achieve common goals .Security has become important issue in the MANETs. Attacks in the adhoc network due to the presence of the malicious node. In this paper, MANET security issue is tackled, namely to prevent the network from malicious node and to establish a secure communication between the secure nodes. II. BACKGROUND MANET is a self-organizing network of mobile nodes. MANET does not have any fixed topology, due to dynamic topology it is very difficult task to secure network topology. Several papers focused on the security issues of the MANET. D. Sterne, et al. [9], described a architecture for intrusion detection to secure MANET. The architecture works in hierarchy it collects the detection data from leaves node and flow upward to the root node. To establish
  • 2. Attack Library Based Intrusion Detection… www.ijesi.org 43 | P a g e a secure communication, the hierarchy automatically reconfigured itself based on network topology. A new intrusion detection system name Enhanced Adaptive Acknowledgement (EAACK) was proposed by U. Sharmila Begam,et al. [1]. EAACK is able to detect the malicious node based on report of misbehaving node. While detecting malicious node, the EAACK does not affect network performance. S.Tamilarasan, et al. [5] describe the logical survey to detect the malicious node based on their behaviour and pattern, and proposed the techniques used for detecting misbehaving nodes. To establish a trust management by monitoring the other neighbor nodes Reijo Savola [8] has proposed a model, and also describe the security metrices used in MANET. III. PROBLEM DOMAIN In many research work different techniques have been proposed for detecting misbehaving nodes. Detecting misbehaving node through proposed techniques is a time consuming process. These techniques are time consuming because they are applied one by one to detect misbehaving node. To overcome this problem author have proposed an attack library based intrusion detection system. Dynamic certificate authority based authentication model is proposed to establish a secure communication between the nodes. IV. BEHAVIORAL CHARACTERISTICS OF NODE IN MANETS In MANET nodes act as receiver and transmitter within communication range. Source node communicates to destination node through intermediate nodes present in the network. Attacker aims to attack the network through these intermediate nodes by making these nodes malicious. Malicious nodes tend to cause fallowing attacks: A.) Black-Hole Attack Fig.2 Black hole attack. In this attack the malicious node advertise or shows itself, having the shortest path to the destination node whose packets it wants to hamper. For e.g. in the above figure N2 (malicious node) in the network advertise itself to have shortest path to the destination node. So N2 node wants to interrupt destination node packet. B. Worm-Hole Attack The attacker creates a tunnel at malicious node so that when malicious node receives a packet it drops the packet through tunnel. Fig.3 Worm hole attack. For e.g. in the above figure the node N4 (Malicious node) creates a tunnel. When node N4 receives a packet then it drops through the tunnel.
  • 3. Attack Library Based Intrusion Detection… www.ijesi.org 44 | P a g e C. Spoofing Attack Misbehaving node hires the identity of another node and receives all the packets or messages of that node. D. Denial of Service The attacker node exploits the bandwidth of the network .The attacker node (malicious node) generates unnecessary route requests so that to make network resources unavailable to authentic nodes. E. Energy Consumption Mobile nodes in MANETs have limited battery backup. So the mobile nodes save their battery power by transmitting only necessary data. In this attack, attacker aims to consume the power of battery by routing unnecessary packets to other nodes. F. Information Disclosure In MANETs the data flow in the network in the form of packets. When the data is processed information is produced. In this attack the attacker attempts to destroy the confidentiality, integrity or availability of the data.  Attacks on confidentiality: The attacker aims to disclose the confidential data of the data packet, which is only accessible by the authorized node.  Attacks on integrity: The integrity of the packet is lost. The attacker, alter the data packets by modification and removal of data packet content.  Attacks on availability: In this attack the attacker node routes huge amount of unnecessary traffic to make network resources unavailable to other nodes. V. INTRUSION DETECTION SYSTEM (IDS) In any network intrusion detection system (IDS) monitors activities of both user and program. Intrusion detection can be done in two ways: Network based intrusion detection and Host based intrusion detection. Network based intrusion detection runs at the gateway of the network and monitor and captures all the information about packet that passes through that gateway whereas host based intrusion detection system runs on the operating system and monitors all the program and event performed by the user or host. A. Attack Library Based Intrusion Detection System An attack library is the collection of types and patterns of attacks. Varying components of attack library based intrusion detection system are as follows:  Analyzer: The work of analyzer is to analyze and monitor the node in the network. Analyzer fallows two methodologies for detection: misuse and anomaly detection. Misuse detection is based on the pattern, in this detection the node pattern in terms of their event sequence is monitor. Anomaly detection is based on the behavior monitoring, the node behavior deviations is compared with normal behavior, if there is change then the analyzer record it.  Attack Library: Attack library is a collection of well-organized designed attacks and test cases. It also provides facility to generate new test cases for new attacks. Attacks are organized in the hierarchy structure. The attack library uses these patterns and behavior to construct the test cases. The attack library works on a step of designed test cases. The attack library generates response on the given input. It also generates the UID (unique ID) for the authentic node. Attack library also monitors the behavior and pattern of directly attached node.  Certificate Authority: Certificate authority is the trusted authority that can be used for issuing certificate to make secure communication .The certificate consists of UID, block signed by certificate authority, Key .UID in the certificate is generated by the attack library after verification of node that it is not a malicious node.
  • 4. Attack Library Based Intrusion Detection… www.ijesi.org 45 | P a g e Fig.4 Attack Library based intrusion detection system Steps involved in attack library based intrusion detection system are: 1. Node A activates the analyzer with information to monitor node B. 2. Node A sends a request to node B to establish a communication path. 3. Node B send acknowledgement to node A. Node B send acknowledgement to ensure that he has received the request. Node B sends a message with acknowledgement whether he wants to establish a connection or not. 4. Analyzer analyzing Node B during the step-2 & 3. Analyzer sends report of Node B to Node A. 5. Node A sends report and acknowledgement of node B. Node A sends ACK of Node B because it contains network parameters like response time etc. 6. Attack library response with a message and UID (unique ID) of both nodes A & B. Message contains information about node B where it is a malicious node or not. The UID is generated by attack library only when the node is not a malicious node. If it is malicious then Node A broadcast a message in the network that Node b is malicious. Here attack library monitor node A (direct attached to attack library) after getting report and acknowledgement of node B. Attack library monitor requesting node (node A) to check it is malicious or not. 7. Sends UID to certificate authority VI. DYNAMIC CERTIFICATE AUTHORITY BASED AUTHENTICATION Fig.5 Dynamic Certificate Authority.
  • 5. Attack Library Based Intrusion Detection… www.ijesi.org 46 | P a g e Dynamic certificate authority is the collection of node UID and its work is to issue certificate to establish a secure communication between the nodes. The UID is used by certificate authority during issuing certificate. UID is generated by the attack library during intrusion detection. Due to the concept of attack library based UID generation only authorized nodes in the network can request for a certificate from certificate authority. In the above diagram C(A) is certificate of node A, C(B) is certificate of node B, PRath is private key of certificate authority, T(A) is time stamp for node A certificate, T(B) is the time stamp for node B certificate, PUa and PUb are the public key of node A and B. Steps involved in Dynamic certificate authority to issue a certificate are: 1. Node A sends a request to node B to establish a connection. 2. Node B asks for certificate from Node A. 3. Node A send request to certificate Authority to generate certificate of node A and also send public key of A. 4. Certificate authority send certificate to node A which includes UID, Time stamp of node A and public key of A. The certificate is encrypted by certificate authority using its own private key. 5. Node A receives certificate and decrypt certificate using the public key of certificate authority. Node A checks for time stamp T (A) to conform that the certificate is not old. Then send C (A) to node B and request for B certificate. 6. Then node B send request to certificate authority to generate certificate C (B) and also sends his own public key PUb . 7. Certificate authority generates certificate and encrypt with its own private key and send to node B. 8. Node B decrypts certificate using public key of certificate authority and checks time stamp. Then node B send certificate C (B) to node A. After exchanging certificate of each other node A and node B can establish a secure communication. In proposed model Dynamic certificate Authority the name dynamic is used because the certificate authority database is transfer to another authentic node present in the network. The certificate authority maintains a priority list of nodes on the basis of number of times the node has requested for the certificate. The certificate authority selects that node which has less time requested for certificate because that node power energy backup is more than the other busy nodes present in network. Fig.6 Transfer of certificate authority database. 1. Steps involved during the transfer of certificate authority database are: 2. Certificate authority selects the node from priority list to which he wants to transfer the certificate authority database. After selecting the node certificate authority send request for UID of node X. 3. The node X response to the request and send UID to certificate authority. 4. Certificate authority checks for the UID and conform that the node is authentic or correct one. Then certificate authority send a message to node X which include that he wants to establish a connection and attach a time stamp that is used maintain a session for given period of time. 5. Node X sends conformation message. 6. Certificate authority transfer database to node X. 7. Certificate authority update attack library with the UID of new certificate authority. 8. After all these process the Node X acts as the new certificate authority.
  • 6. Attack Library Based Intrusion Detection… www.ijesi.org 47 | P a g e VII. CONCLUSION This paper focuses on security measures to secure MANETs from attacker. The proposed model which is based on Attack library based intrusion detection system, helps in detecting the malicious node to secure the network. Further dynamic certificate authority based authentication model have been proposed which is used to make an trusted communication between the nodes by using exchanging certificate. VIII. FUTURE SCOPE Many research has been done and going on the security of MANET. Moreover the proposed security model is used to detect the malicious node and to make a secure communication. Our future work will include the further exploration of attack library i.e. patterns, test cases and to implement the proposed model using simulator. IX. ACKNOWLEDGMENT I would like to thanks Maj. K.K. Ohri (AVSM), Pro.V.C, Amity University, Lucknow Campus. I would like to further extend my sincere gratitude to Prof. S.T.H. Abdi, Director(ASET) , and Brig. Umesh Chopra, Deputy Director (ASET), Amity University, Lucknow Campus for their encouragement. I am extremely grateful to Prof.Deepak Arora, head of computer science and engineering department for this insightful comment. I would like to express my sincere thanks to Bramah Hazela , Assistant professor , Department of computer science and engineering ,Amity University Lucknow. REFERENCES [1]. U. SharmilaBegam, Dr. G. Murugaboopathi, “A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS” in International Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1, January 2013. [2]. DilipVishwakarma, Deepak Chopra, “International Journal of Engineering and Advanced Technology” in Volume-1, Issue-6, August 2012. [3]. Mohammed Mujeeb, Sudhakar K N, JitendranathMungara, “Reputation-Based Security Protocol for MANETs” in International Journal of Innovative Technology and Exploring EngineeringVolume-1, Issue-2, July 2012. [4]. Chandreyee Chowdhury, SarmisthaNeogy, “SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST” in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011. [5]. S. Tamilarasan and Dr. Aramudan, “A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System” in International Journal of Computer 258 Science and Network Security, VOL.11 No.5, May 2011. [6]. N.Jaisankar, K.DuraiSwamy “A Novel security framework for protecting Network Layer operations in MANET” in International Journal of Engineering and Technology Vol.1,No.5,December, 2009. [7]. S. Madhavi, Dr. Tai Hoon Kim, “AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOCNETWORKS” in International Journal of Security and Its Applications Vol. 2, No.3, July, 2008. [8]. Reijo Savola, “Node-Level Information Security Monitoring for Mobile Ad Hoc Networks” in Proceedings of the ETRICS'06 Workshop on Security in Autonomous Systems, 2006. [9]. D. Sterne, P. Balasubramanyam, D. Carman1, B. Wilson, R. Talpade, C. Ko,R. Balupari, C-Y. Tseng2, T. Bowen, K. Levitt and J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs” in Third IEEE International Workshop on Information Assurance ,2005. [10]. RicardoPuttini, Rafael de Sousa, LudovicMé, “Combining Certification-based Authentication and Intrusion Detection toSecure Manet Routing Protocols” in Proceedings of the European Wireless Conference Mobile and Wireless Systems Beyond 3G ,2004. [11]. Y. Huang and W. Lee, “A cooperative intrusion detection system for ad hoc networks,” in Proc. ACM Workshop onSecurity in Ad Hoc and Sensor Networks (SASN'03),October 2003. [12]. S. Capkun, L. Buttyan, and J. P. Hubaux.“Self-organized public key management for mobile ad hoc networks” in IEEE Transactions on Mobile Computing, page 17, 2003.