Browse > Article
http://dx.doi.org/10.33778/kcsa.2021.21.1.121

A Study on Intrusion Detection Method using Collaborative Technique  

Yang, Hwan Seok (중부대학교/정보보호학과)
Publication Information
Abstract
MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.
Keywords
Intrusion Detection; Mobile Ad-hoc Network; P2P Mesh Network; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Meddeb, R., Triki, B., Jmili, F., & Korbaa, O., "An effective IDS against routing attacks on mobile ad hoc networks", Frontiers in Artificial Intelligence and Applications, pp. 201-204, 2018.
2 S. Sreenivasa Chakravarthi and Suresh Veluru, "A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS", 2014 Sixth International Conference on Computational Intelligence and Communication Networks 2014 IEEE, pp. 730-737.
3 E Vishnu Balan, M K Priyan, C Gokulnath and G Vsha Devi, "Fuzzy Based Intrusion Detection Systems in MANET", science direct elsevier Procedia Computer Science, vol. 50, pp. 109-114, 2015.   DOI
4 S. S. Zalte and V. R. Ghorpade2, "Pre-Path and Post-Path Security to Mobile Adhoc Network", 2017 IJSRSET, vol. 3, pp. 575-578.
5 Borkar, A., Donode, A., & Kumari, A., "A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (SA-IDPS)", In 2017 International conference on inventive computing and informatics (ICICI).
6 Naeem Razal, Muhammad Umar Aftabl, Muhammad Qasim Akbar2, Omair Ashraf3 and Muhammad Irfan4, "Mobile Ad-Hoc Networks Applications and Its Challenges" in Communications and Network, pp. 131-136, 2016.   DOI
7 Tarek M. Mahmoud, Abdelmgeid A. Aly and M. Omar Makram, "A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs", International Journal of Computer Applications (0975-8887), vol. 109, no. 6, pp. 27-33, January 2015.   DOI