Browse > Article

Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM  

Yang, Hwan Seok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.8, no.2, 2012 , pp. 41-47 More about this Journal
Abstract
MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.
Keywords
Mobile Ad-hoc Network; IDS; Anomaly Detection; SVM;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless Sensor Network Security: A Survey," Security in Distributed Grid and Pervasive Computing, 2006, pp. 1-50.
2 김태경, "디렉티드 디퓨젼 기반의 무선 센서 네 트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 31-36.
3 Liu Y, Li Y and Man H, "MAC Layer Anomaly Detecion in Ad hoc Networks," Proc. of the 6th IEEE Information Assurance Workshop, 2005, pp. 402-409.
4 Mitrokotsa A. Komninos N. and Douligeris C., "Intrusion Detection with Neural Networks and Watermarking Techniques for MANET," Proceedings of IEEE International Conference on Pervasive Services, 2007, pp. 118-127.
5 신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제 8권, 제1호, 2012, pp. 125-137.
6 Mishra, A., Nadkarni, K., and Patcha, A., "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, 2004, pp. 48-60.
7 A. Stetesko, L. Folkman, and V. Matayas, "Neighborbased Intrusion Detection for Wireless Sensor Network," 6th international Conference on Wireless and Mobile Communicationsm, IEEE, 2010, pp. 420-425.
8 T. H. Hai, E. N. Huh, and M. Jo, "A Lightweight Intrusion Detection Framework for Wireless Sensor Networks," Wireless Communications and Mobile Computing, Vol. 10, Issue. 4, 2010, pp. 559-572.