Abstract
Mobile Ad-Hoc NETworks (MANETs) are highly vulnerable to various security threats due to the numerous constraints they present, such as the absence of a fixed infrastructure, the dynamic topology change, their dependence on cooperative communication, the limited resource constraints, the unreliability of wireless links, and most importantly the lack of a clear line of defence. In this paper, MANET security issues are addressed through a comprehensive analysis of some common security threats, mainly blackhole, grayhole and the selfish behaviour attack. This has led to the building of a new intrusion response system denoted MASID-R-SA. This system is capable of providing autonomic systematic responses based on the intrusions’ measured severity level. The main objective of this approach is to better survive both single and multiple intrusion scenarios while minimizing the negative consequences of adopting typical static responses. We demonstrate through simulations the effectiveness of the proposed intrusion response system in appropriately responding to both single and multiple intrusions. For instance, a true detection rate of 97,23% and an average of 96,33% response success rate are achieved. The study revealed, also, that the proposed system solves some critical issues related to network partitioning and remerging efficiently.
Similar content being viewed by others
References
Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H (2002) An on demand secure routing protocol resilient to byzantine failures Proceedings of the first workshop on wireless security, wise’02, pp 21–30
Banerjee S, Majumder K (2012) A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In: Thampi S, Zomaya A, Strufe T, Alcaraz Calero J, Thomas T. (eds) Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science, vol 335. Springer, Berlin Heidelberg, pp 396–407
Cheng BC, Tseng RY (2011) A context adaptive intrusion detection system for manet. ComputCommun 34:310–318
Fall K, Varadhan K (2010) The VINT Project: The ns Manual. http://www.isi.edu/nsnam/ns/ns-documentation
Gupta A, Harsh S, Anil K (2010) A performance analysis of aodv, dsr & tora routing protocols. Int J Eng Tech 2:226–231
Indirani G, Selvakumar K (2012) Swarm based intrusion detection and defense technique for Malicious attacks in mobile ad hoc networks. Int J Comput Appl 50(19):1–7
Liao HJ, Richard CH, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24
Mafra P, Fraga J, Santin A (2014) Algorithms for a distributed ids in manets. J Comput Syst Sci 80:554–570
Malczewski J, Rinner C (2015) Multiattribute decision analysis methods. In: Malczewski J, Rinner C (eds) Multicriteria Decision Analysis in Geographic Information Science, Advances in Geographic Information Science. Springer, US, pp 81–121
Marchang N, Datta R (2008) Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw 06: 503–528
Mechtri L, Djemili FT, Ghanemi S (2012) Masid: Multi-agent system for intrusion detection in MANET Proceedings of the 2012 ninth international conference on information technology - new generations, ITNG ’12. IEEE Computer Society, Washington, DC, USA, pp 65–70
Mechtri L, Djemili FT, Ghanemi S, Magoni D (2015) An IDS -based Self-healing Approach for MANET Survival Proceedings of the international conference on intelligent information processing, security and advanced communication, IPAC ’15. ACM, New York, NY, USA, pp 1–5
Mechtri L, Djemili F, Ghanemi S (2015) Agents for intrusion detection in MANET: Survey and analysis. In: Awad W, Al-Bastaki Y, El-Alfy ES (eds) Improving Information Security Practices through Computational Intelligence, Advances in Information Security, Privacy, and Ethics, IGI Global, pp 127–147
Nadeem A, Howarth M (2014) An intrusion detection and adaptive response mechanism for manets. Ad Hoc Netw 13:368–380
Perkins C, Belding-Royer E, Das S (2003), Ad hoc on-demand distance vector (aodv) routing. http://www.ietf.org/rfc/rfc3561.txt
Ping Y, Futai Z, Xianghao J, Jianhua L (2007) Multi-agent cooperative intrusion response in mobile ad hoc networks. J Syst Eng Electron 18:785–794
Razak S, Furnell S, Clarke N, Brooke P (2008) Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw 6:1151–1167
Seresht N, Azmi R (2014) Mais-ids: a distributed intrusion detection system using multi- agent AIS approach. Eng Appl Artif Intel 35:286–298
Sharma P, Sharma N, Singh R (2012) A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network. Int J Comput Appl 41(21):16–21
Talooki V, Ziarati K (2006) Performance comparison of routing protocols for mobile ad hoc networks Proceedings of Asia-Pacific Conference on Communications, APCC ’06. doi:10.1109/APCC.2006.255924, pp 1–5
Usha and Bose (2012) Comparing the impact of black hole and gray hole attacks in mobile adhoc networks. J Comput Sci 8(11):1788–1802
Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen XS, Du DZ (eds) Wireless Network Security, Signals and Communication Technology. Springer, US, pp 103–135
Yang H, Shu J, Meng X, Lu S (2006) Scan: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mechtri, L., Tolba, F.D. & Ghanemi, S. An optimized intrusion response system for MANET:. Peer-to-Peer Netw. Appl. 11, 602–618 (2018). https://doi.org/10.1007/s12083-017-0573-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-017-0573-5