Loading

An Efficient Attack Detection System for Mobile Ad-hoc Network
Dilip Vishwakarma1, Deepak Chopra2
1Dilip Vishwakarma, Department of Computer Application, Vidisha, (M.P) India.
2Deepak Chopra, Samrat Ashok Technological Intitute, Vidisha, (M.P) India.
Manuscript received on July 17, 2012. | Revised Manuscript received on August 25, 2012. | Manuscript published on August 30, 2012. | PP: 21-26 | Volume-1 Issue-6, August 2012.  | Retrieval Number: F0593071612/2012©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A mobile ad hoc network (MANET) is a wireless network that does not rely on any fixed infrastructure (i.e., routing facilities, such as wired networks and access points), and whose nodes must coordinate among themselves to determine connectivity and routing. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. Since prevention techniques are never enough, intrusion detection systems (IDSs), which monitor system activities and detect intrusions, are generally used to complement other security mechanisms. How to detect intrusions effectively and efficiently on this highly dynamic, distributed and resource-constrained environment is a challenging research problem. In this paper, we investigate the use of evolutionary computation techniques for synthesizing intrusion detection programs on MANETs. We evolve programs to detect the following attacks against MANETs: dropping attacks and power consumption attack. The proposed system is a novel architecture that uses knowledge-based intrusion detection techniques to detect the attacks that an adversary can perform against the routing fabric of mobile ad hoc networks. Moreover, the system is designed to take countermeasures to minimize the effectiveness of an attack and keep the performance of the network within acceptable limits. The novelty of the system lies in the usage of timed finite state machines that enable the real-time detection of attacks. Our system does not introduce any changes to the underlying routing protocol and operates as an intermediate component between the network traffic and the routing protocol. The system was developed and tested to operate in AODV-enabled networks. Our experimental results compare with normal AODV, under attack AODV and the results is more efficient than existing works.
Keywords: In this paper, we investigate the use of evolutionary computation techniques for synthesizing intrusion detection programs on MANETs.