Browse > Article

An IDS in MANET with Cross Layer Concept  

Kim, Sang-Eun (Dept. of Information and Communication Engineering, Chosun University)
Han, Seung-Jo (Dept. of Information and Communication Engineering, Chosun University)
Abstract
Intrusion detection forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. We have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes. The information available across different layers of protocol stack are exploited in order to improve the accuracy of detection. We have used cooperative and distributive anomaly intrusion detection with data mining technique to enhance the proposed architecture. The simulation of the proposed architecture is done in OPNET simulator and the results are analyzed.
Keywords
IDS; Cross Layer; DoS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Thamilarasu, G., et al. "A cross-layer based intrusion detection approach for wireless ad hoc networks", Mobile Ad hoc and Sensor Systems Conference, 2005. IEEE International Conference on 2005
2 C. J. John Felix, A. Das, B.-C. Seet, and B.-S. Lee, "Cross Layer versus Single Layer Approaches for Intrusion Detection in MANET", IEEE International Conference on Networks 2007 (ICON 2007), Nov 2007
3 J. S. Baras and S. Radosavac, "Attacks and Defenses Utilizing Cross-Layer Interactions in MANET" , Workshop on Cross-Layer Issues in theDesign of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management, June 2–3, 2004, Naval Research Laboratory, Washington, DC
4 Y. Liu, Y. Li, and H. Man, "Short paper: A distributed cross-layer intrusion detection system for ad hoc networks", In Proc. IEEE/Create Net the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 418-420, September 2005
5 C. J. John Felix, A. Das, B.-C. Seet, and B.-S. Lee, "CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs", IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, CA, USA, March 2008.
6 C. Loo, M. Ng, C. Leckie and M. Palaniswami. Intrusion Detection for Routing attacks in Sensor Networks. In International Journal of Distributed Sensor Networks, october-December 2006,2(4): 313-332   DOI   ScienceOn
7 Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer (2002) and J. Oldmeadow, S. Ravinutala and C. Leckie, "Adaptive Clustering for Network Intrusion Detection."In Proceedings of the Third International Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2004), May 2004, pp. 255-259
8 OPNET modeler, http://www.opnet.com/
9 T. Phit and K. Abe, "Protocol Specification-based Intrusion Detection System for VoIP," Technical Report of IEICE, 2008