Abstract
A Mobile Ad Hoc Network (MANET) is a network built on ad hoc demand by some mobile wireless nodes geographically distributed over an area. There is no fixed infrastructure and also no centralized administration. The traditional security measures fail to provide the required security level in MANETs. Specialised detection schemes are to be employed for detecting the intruder attack in MANET. The intrusion detection systems based on mobile agents uses a set of mobile agents moving from one node to another node within a network. The distributed ID consists of multiple mobile agents which cooperate over a large network and communicate with each other. This as a whole reduces network bandwidth usage by moving data analysis computation to the location of the intrusion data & support heterogeneous platforms. In this paper, a mobile agent based IDS have been proposed to detect the black hole attack in MANET, with the aim of reducing computational complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Roy, D.B., Chaki, R., Chaki, N.: A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. International Journal of Network Security & Its Applications (IJNSA) 1 (April 2009)
Onashoga, S.A., Akinde, A.D., Sodiya, A.S.: A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems. Issues in Informing Science and Information Technology 6 (2009)
Chaki, R., Chaki, N.: IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. In: Proc. of the 6th Int’l Conf. on Computer Information Systems and Industrial Management Applications (CISIM 2007), pp. 179–184 (June 2007)
Jahnke, M., Toelle, J., Finkenbrink, A., Wenzel, A., et al.: Methodolo gies and Frameworks for Testing IDS in Adhoc Networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, pp. 113–122 (2007)
Abraham, A., Jain, R., Thomas, J., Han, S.Y.: D-SCIDS: Distributed soft computing intrusion detection system. Journal of Network and Computer Application 30, 81–98 (2007)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas of Communications 24(2), 370–380 (2006)
Sodiya, A.S.: Multi-level and Secured Agent-based Intrusion Detection System. Journal of Computing and Information Technology - CIT 14(3), 217–223 (2006), doi:10.2498/cit.2006.03.05
Mitrokotsa, A., Mavropodi, R., Douligeris, C.: Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks, Ayia Napa, Cyprus, July 6-7 (2006)
Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 965–970. Springer, Heidelberg (2006)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, U.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11, 38–47 (2004)
Hu, Y.-C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and Privacy Magazine 2(3), 28–39 (2004)
Eid, M., Artail, H., Kayssi, A., Chehab, A.: An adaptive intrusion detection and defense system based on mobile agents. In: Innovations in Information Technologies, IIT 2004 (2004)
Li, C., Song, Q., Zhang, C.: MA-IDS: Architecture for distributed intrusion detection using mobile agents. In: 2nd International Conference on Information Technology for Application, ICITA 2004 (2004)
Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.T.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, vol. 3284, pp. 244–253. Springer, Heidelberg (2004)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, vol. 3, pp. 1976–1986 (2003)
Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. NIST Interim Report (IR) –6416 (October 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roy, D.B., Chaki, R. (2011). MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System. In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-27245-5_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27244-8
Online ISBN: 978-3-642-27245-5
eBook Packages: Computer ScienceComputer Science (R0)