HMM-Based IDS for Attack Detection and Prevention in MANET

  • Priya Pathak
  • Ekta Chauhan
  • Sugandha Rathi
  • Siddhartha Kosti
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 10)

Abstract

MANETs are wireless networks which communicate without BS and centralized control nodes. Due to its mobile nature of nodes, topology of the network changes frequently. So it is most difficult to stimulate this network. The main task is to provide an efficient and effective routing in MANETs with limited resources. As MANET is an open medium, it is open to numerous attacks by the attackers. To avoid attacks, a good intrusion detection and prevention system is developed. This paper gives a brief survey about different IDS developed to protect attacks in MANET have been briefed. To strengthen the security of IDS, we propose a hidden Markova model-based IDS for MANET for preventing network from attacks. HMM implements learning on the nodes of the network. Based on this learning, the results show the best possible positions and probability of the attacker node.

Keywords

MANET IDS Black hole Gray hole HMM 

References

  1. 1.
    Apurva Kulkarni, Mr. Prashant Rewagad, Mr. Mayur Agrawal; “Literature Survey on IDS of MANET”. International Journal of scientific research and management (IJSRM), (2015).Google Scholar
  2. 2.
    Athira V Panicker, Jisha G; “Network Layer Attacks and Protection in MANETA Survey”. International Journal of Computer Science and Information Technologies, Vol. 5 (3), (2014), 3437–3443.Google Scholar
  3. 3.
    Adnan Nadeem, Michael P Howarth, “A Survey of MANET Instrusion Detection & Prevention Approaches for Network Layer Attacks”, Proc. IEEE Communications Surveys & Tutorials, Vol. 15, No. 4, Fourth Quarter (2013).Google Scholar
  4. 4.
    Ranjit j. Bhosale, Prof. R.K. Ambekar; “A Survey on Intrusion detection System for Mobile Ad-hoc Networks”. International Journal of Computer Science and Information Technologies, Vol. 5 (6), (2014).Google Scholar
  5. 5.
    Anjum F, Talpade R, LiPaD: Lightweight Packet Drop Detection for Ad hoc Networks. In Proc of IEEE Veh Technol Conf (VTC) 2:1233–1237, (2004).Google Scholar
  6. 6.
    Elhadi, M. Shakshuki., Nan Kang, Tarek R. Sheltami, “Eaack—a secure intrusion-detection system for manets”. IEEE transactions on industrial electronics, vol. 60, March (2013).Google Scholar
  7. 7.
    M. Mohanapriya, Ilango Krishnamurthy, ––Modified DSR Protocol for Detection and Removal of Selective Black Hole Attack in MANET‖, Computers and Electrical Engineering, Elsevier science, (2013).Google Scholar
  8. 8.
    R. H. Akbani, S. Patel and D. C. Jinwala, DoS attacks in mobile ad hoc networks: A survey, in Proc. 2nd Int. Meeting ACCT, (2012).Google Scholar
  9. 9.
    A. Nadeem and M. Howarth, “Adaptive intrusion detection and prevention of Denial of Service attacks in MANETs”, Proceeding of ACM 5th International Wireless Communication and Mobile Computing Conference, (2008).Google Scholar
  10. 10.
    Nadeem, A., & Howarth, M., A generalized intrusion detection & prevention mechanism for securing MANETs. In Proceedings of IEEE international conference on ultra modern telecommunications & workshops, St. Petersburg, Russia, (2009).Google Scholar
  11. 11.
    A. Nadeem, M. Howarth, A. Nadeem, M. Howarth, Protection of MANETs from a range of attacks using an intrusion detection and prevention system, Telecommunications Systems Journal Springer, (2013).Google Scholar
  12. 12.
    A. Nadeem, M. Howarth, An intrusion detection & adaptive response mechanism for MANETs, Elsevier Journal of Ad Hoc Networks, 368–380, (2014).Google Scholar
  13. 13.
    Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September (2003).Google Scholar
  14. 14.
    O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks,”Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03), p. 57.1, January (2003).Google Scholar
  15. 15.
    P. Brutch and C. Ko, “Challenges in Intrusion Detection for Wireless Ad-hoc Networks,” Proceedings of 2003 Symposium on Applications and the Internet Workshop, pp. 368–373, January (2003).Google Scholar
  16. 16.
    Zhang Y, Lee W, Intrusion Detection in Wireless Ad Hoc Networks. In Proc of the 6th Int Conf on Mobil Comput and Netw (MobiCom): 275–283, (2000).Google Scholar
  17. 17.
    Huang Y, Fan W et al, Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In Proc of 23rd IEEE Int Conf on Distrib Comput Syst (ICDCS):478–487, (2003).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Priya Pathak
    • 1
  • Ekta Chauhan
    • 2
  • Sugandha Rathi
    • 3
  • Siddhartha Kosti
    • 4
  1. 1.MPCTBanasthali, GwaliorIndia
  2. 2.ITMTonk, GwaliorIndia
  3. 3.SRCEMGwaliorIndia
  4. 4.Indian Institute of Technology KanpurKanpurIndia

Personalised recommendations