Browse > Article
http://dx.doi.org/10.17662/ksdim.2014.10.4.089

A Study on Multi-level Attack Detection Technique based on Profile Table  

Yang, Hwan Seok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.10, no.4, 2014 , pp. 89-96 More about this Journal
Abstract
MANET has been applied to a wide variety of areas because it has advantages which can build a network quickly in a difficult situation to build a network. However, it is become a victim of malicious nodes because of characteristics such as mobility of nodes consisting MANET, limited resources, and the wireless network. Therefore, it is required to lightweight attack detection technique which can accurately detect attack without causing a large burden to the mobile node. In this paper, we propose a multistage attack detection techniques that attack detection takes place in routing phase and data transfer phase in order to increase the accuracy of attack detection. The proposed attack detection technique is composed of four modules at each stage in order to perform accurate attack detection. Flooding attack and packet discard or modify attacks is detected in the routing phase, and whether the attack by modification of data is detected in the data transfer phase. We assume that nodes have a public key and a private key in pairs in this paper.
Keywords
Attack Detection; Profile Table; Routing Protocol; MANET;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhou, L. and Haas, Z. J., "Securing ad hoc networks," IEEE Network, 2008, Vol. 13, Issue 6, pp. 24-30.
2 A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks : A non-cooperative game approach," in 3rd IEEE International Symposium on Network Computing andApplications, (NCA 2004), Boston, MA, August 2004, pp. 343-346.
3 신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 125-137.
4 A. Hasswa, M. Zulker, and H. Hassanein, "Routeguard: an intrusion detection and response system for mobile ad hoc networks," Wireless And Mobile Computing, Networking And Communication, 2005, Vol. 3, pp. 336-343.
5 V. Bhuse, A. Gupta, "Anomaly intrusion detection in wireless sensor network," Journal of High Speed Networks, 2006, Vol. 15, Issue 1, pp. 33-51.
6 Shakshuki, E., Kang, N., Sheltami, T., "EAACK - A Secure Intrusion Detection System for MANETs," IEEE Transactions on Industrial Electronics, 2013, Vol. 60, No. 1, pp. 1089-1098.   DOI   ScienceOn
7 최희식, 박재표, 전문석, "SIP 플러딩 탐지 차단실험방법에 대한 연구," 디지털산업정보학회지, 제7권, 제2호, 2011, pp. 39-46.
8 D. R. Raymond and S. F. Midkif, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, 2008, Vol. 7, No. 1, pp. 74-81.   DOI   ScienceOn
9 Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Marimuthu Palaniswami. Intrusion Detection for Routing Attacks in Sensor Networks, International Journal of Distributed Sensor Networks, 2006, Vol. 2, Issue 4, pp. 313-332.   DOI   ScienceOn
10 Al-Roubaiey, A. Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H., "AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement," Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, Vol. 3, No. 1, pp. 634-640.