Novel Intrusion Detection and Prevention Techniques for Mobile Ad hoc Networks

Abstract

In the past few years, there has been a rapid increase in the use of wireless technologies, hence creating avenues for application of these in lesser explored domains. One such domain is Mobile ad hoc networks (MANETs) wherein mobile nodes are organized without any predefined infrastructure in a network. It is however important to secure MANETs due to their frequent usage in critical applications in which solidarity of data and communication is important. Existing solutions are as such not enough for this level of security, so coupling them with intrusion detection mechanisms is the need of the hour in order to protect our networks from active attacks. newline newlineThe attacks studied in our scheme are Denial of Service(DoS), User to Root(U2R), Probe and Vampire. A novel method to detect and prevent intrusions using specialized techniques such as detection and prevention in a single and multi attack scenario as well as forensics and neural networks in a MANET environment has been studied. This has been accomplished by firstly detecting the malicious behavior of node(s) and then applying specialized techniques to prevent them from further exploiting the network. Distributed trust based schemes in the detection of single and multi attack scenarios have been studied wherein attacks are encountered when they appear one by one as well as simultaneously in the network. The analysis is done on the basis of behavior which is a profile based analysis in the nature of attacks. Finally forensic methods have been applied for the further eradication of maliciousness in the network. Basic machine learning techniques through the use of neural network schemes at the basic level have been applied in order to make the network foolproof hence attaining an accuracy of 98 to 99 percent correct data received by the destination. newline newlineIt is observed that malicious node detection is high, accuracy is high and false positive rate is low by the application of our scheme as compared to the reported literature.

Description

Keywords

Citation

Collections

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced