Browse > Article
http://dx.doi.org/10.17662/ksdim.2010.6.4.153

The Study of Hierarchical Intrusion Detection Based on Rules for MANET  

Jung, Hye Won (조선이공대학 시각영상디자인)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.6, no.4, 2010 , pp. 153-160 More about this Journal
Abstract
MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.
Keywords
Intrusion Detection System; Intrusion Prevention System; Mobile Ad-hoc Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 유응구, "MANET에서의 에너지를 고려한 라우팅 프로토콜," 디지털산업정보학회, 디지털산업정보학회논문지 제3권, 제3호, 2007.
2 Yongguang Zhang, Wenke Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," Proceedings of the sixth international conference on Mobile Computing and Networking(MobiCom 2000), Boston, MA, August 2000.
3 최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털산업정보학회, 디지털산업정보학회논문지 제6권, 제1호, 2010.
4 Salvatore J. Stolfo, et al., "Anomaly Detection in Computer Security and an Application to File System Accesses," Proceedings of 15th International Symposium of Foundations of Intelligent Systems, 2005.
5 Shi Zhong, Taghi M. Khoshgoftaar, and Naeem Seluya, "Evaluating Clustering Techniques for Network Intrusion Detection," In Proceeding of the 10th ISSAT International Conference on Reliability and Quality and Design, Las Vegas, Nevada, 2004, pp. 149-155.
6 Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense aginst wormhole attacks in wireless networks," In Proceeding of IEEE Infocomm, 2003, pp. 349-364.
7 J. Deng, R. Han, and S. Mishra, "A performance evaluation of intrusion-tolerant routing in wireless sensor networks," In Proceeding of IEEE 2nd Int'l Workshop on info Processing in Sensor Networks, April 2003.