Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2018

16.06.2017

An optimized intrusion response system for MANET:

An attack-severity aware approach

verfasst von: Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad-Hoc NETworks (MANETs) are highly vulnerable to various security threats due to the numerous constraints they present, such as the absence of a fixed infrastructure, the dynamic topology change, their dependence on cooperative communication, the limited resource constraints, the unreliability of wireless links, and most importantly the lack of a clear line of defence. In this paper, MANET security issues are addressed through a comprehensive analysis of some common security threats, mainly blackhole, grayhole and the selfish behaviour attack. This has led to the building of a new intrusion response system denoted MASID-R-SA. This system is capable of providing autonomic systematic responses based on the intrusions’ measured severity level. The main objective of this approach is to better survive both single and multiple intrusion scenarios while minimizing the negative consequences of adopting typical static responses. We demonstrate through simulations the effectiveness of the proposed intrusion response system in appropriately responding to both single and multiple intrusions. For instance, a true detection rate of 97,23% and an average of 96,33% response success rate are achieved. The study revealed, also, that the proposed system solves some critical issues related to network partitioning and remerging efficiently.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H (2002) An on demand secure routing protocol resilient to byzantine failures Proceedings of the first workshop on wireless security, wise’02, pp 21–30 Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H (2002) An on demand secure routing protocol resilient to byzantine failures Proceedings of the first workshop on wireless security, wise’02, pp 21–30
2.
Zurück zum Zitat Banerjee S, Majumder K (2012) A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In: Thampi S, Zomaya A, Strufe T, Alcaraz Calero J, Thomas T. (eds) Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science, vol 335. Springer, Berlin Heidelberg, pp 396–407 Banerjee S, Majumder K (2012) A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In: Thampi S, Zomaya A, Strufe T, Alcaraz Calero J, Thomas T. (eds) Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science, vol 335. Springer, Berlin Heidelberg, pp 396–407
3.
Zurück zum Zitat Cheng BC, Tseng RY (2011) A context adaptive intrusion detection system for manet. ComputCommun 34:310–318 Cheng BC, Tseng RY (2011) A context adaptive intrusion detection system for manet. ComputCommun 34:310–318
5.
Zurück zum Zitat Gupta A, Harsh S, Anil K (2010) A performance analysis of aodv, dsr & tora routing protocols. Int J Eng Tech 2:226–231 Gupta A, Harsh S, Anil K (2010) A performance analysis of aodv, dsr & tora routing protocols. Int J Eng Tech 2:226–231
6.
Zurück zum Zitat Indirani G, Selvakumar K (2012) Swarm based intrusion detection and defense technique for Malicious attacks in mobile ad hoc networks. Int J Comput Appl 50(19):1–7 Indirani G, Selvakumar K (2012) Swarm based intrusion detection and defense technique for Malicious attacks in mobile ad hoc networks. Int J Comput Appl 50(19):1–7
7.
Zurück zum Zitat Liao HJ, Richard CH, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24CrossRef Liao HJ, Richard CH, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24CrossRef
8.
Zurück zum Zitat Mafra P, Fraga J, Santin A (2014) Algorithms for a distributed ids in manets. J Comput Syst Sci 80:554–570CrossRefMATH Mafra P, Fraga J, Santin A (2014) Algorithms for a distributed ids in manets. J Comput Syst Sci 80:554–570CrossRefMATH
9.
Zurück zum Zitat Malczewski J, Rinner C (2015) Multiattribute decision analysis methods. In: Malczewski J, Rinner C (eds) Multicriteria Decision Analysis in Geographic Information Science, Advances in Geographic Information Science. Springer, US, pp 81–121 Malczewski J, Rinner C (2015) Multiattribute decision analysis methods. In: Malczewski J, Rinner C (eds) Multicriteria Decision Analysis in Geographic Information Science, Advances in Geographic Information Science. Springer, US, pp 81–121
10.
Zurück zum Zitat Marchang N, Datta R (2008) Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw 06: 503–528CrossRef Marchang N, Datta R (2008) Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw 06: 503–528CrossRef
11.
Zurück zum Zitat Mechtri L, Djemili FT, Ghanemi S (2012) Masid: Multi-agent system for intrusion detection in MANET Proceedings of the 2012 ninth international conference on information technology - new generations, ITNG ’12. IEEE Computer Society, Washington, DC, USA, pp 65–70CrossRef Mechtri L, Djemili FT, Ghanemi S (2012) Masid: Multi-agent system for intrusion detection in MANET Proceedings of the 2012 ninth international conference on information technology - new generations, ITNG ’12. IEEE Computer Society, Washington, DC, USA, pp 65–70CrossRef
12.
Zurück zum Zitat Mechtri L, Djemili FT, Ghanemi S, Magoni D (2015) An IDS -based Self-healing Approach for MANET Survival Proceedings of the international conference on intelligent information processing, security and advanced communication, IPAC ’15. ACM, New York, NY, USA, pp 1–5 Mechtri L, Djemili FT, Ghanemi S, Magoni D (2015) An IDS -based Self-healing Approach for MANET Survival Proceedings of the international conference on intelligent information processing, security and advanced communication, IPAC ’15. ACM, New York, NY, USA, pp 1–5
13.
Zurück zum Zitat Mechtri L, Djemili F, Ghanemi S (2015) Agents for intrusion detection in MANET: Survey and analysis. In: Awad W, Al-Bastaki Y, El-Alfy ES (eds) Improving Information Security Practices through Computational Intelligence, Advances in Information Security, Privacy, and Ethics, IGI Global, pp 127–147 Mechtri L, Djemili F, Ghanemi S (2015) Agents for intrusion detection in MANET: Survey and analysis. In: Awad W, Al-Bastaki Y, El-Alfy ES (eds) Improving Information Security Practices through Computational Intelligence, Advances in Information Security, Privacy, and Ethics, IGI Global, pp 127–147
14.
Zurück zum Zitat Nadeem A, Howarth M (2014) An intrusion detection and adaptive response mechanism for manets. Ad Hoc Netw 13:368–380CrossRef Nadeem A, Howarth M (2014) An intrusion detection and adaptive response mechanism for manets. Ad Hoc Netw 13:368–380CrossRef
16.
Zurück zum Zitat Ping Y, Futai Z, Xianghao J, Jianhua L (2007) Multi-agent cooperative intrusion response in mobile ad hoc networks. J Syst Eng Electron 18:785–794CrossRef Ping Y, Futai Z, Xianghao J, Jianhua L (2007) Multi-agent cooperative intrusion response in mobile ad hoc networks. J Syst Eng Electron 18:785–794CrossRef
17.
Zurück zum Zitat Razak S, Furnell S, Clarke N, Brooke P (2008) Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw 6:1151–1167CrossRef Razak S, Furnell S, Clarke N, Brooke P (2008) Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw 6:1151–1167CrossRef
18.
Zurück zum Zitat Seresht N, Azmi R (2014) Mais-ids: a distributed intrusion detection system using multi- agent AIS approach. Eng Appl Artif Intel 35:286–298CrossRef Seresht N, Azmi R (2014) Mais-ids: a distributed intrusion detection system using multi- agent AIS approach. Eng Appl Artif Intel 35:286–298CrossRef
19.
Zurück zum Zitat Sharma P, Sharma N, Singh R (2012) A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network. Int J Comput Appl 41(21):16–21 Sharma P, Sharma N, Singh R (2012) A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network. Int J Comput Appl 41(21):16–21
20.
Zurück zum Zitat Talooki V, Ziarati K (2006) Performance comparison of routing protocols for mobile ad hoc networks Proceedings of Asia-Pacific Conference on Communications, APCC ’06. doi:10.1109/APCC.2006.255924, pp 1–5 Talooki V, Ziarati K (2006) Performance comparison of routing protocols for mobile ad hoc networks Proceedings of Asia-Pacific Conference on Communications, APCC ’06. doi:10.​1109/​APCC.​2006.​255924, pp 1–5
21.
Zurück zum Zitat Usha and Bose (2012) Comparing the impact of black hole and gray hole attacks in mobile adhoc networks. J Comput Sci 8(11):1788–1802CrossRef Usha and Bose (2012) Comparing the impact of black hole and gray hole attacks in mobile adhoc networks. J Comput Sci 8(11):1788–1802CrossRef
22.
Zurück zum Zitat Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen XS, Du DZ (eds) Wireless Network Security, Signals and Communication Technology. Springer, US, pp 103–135CrossRef Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen XS, Du DZ (eds) Wireless Network Security, Signals and Communication Technology. Springer, US, pp 103–135CrossRef
23.
Zurück zum Zitat Yang H, Shu J, Meng X, Lu S (2006) Scan: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273CrossRef Yang H, Shu J, Meng X, Lu S (2006) Scan: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273CrossRef
Metadaten
Titel
An optimized intrusion response system for MANET:
An attack-severity aware approach
verfasst von
Leila Mechtri
Fatiha Djemili Tolba
Salim Ghanemi
Publikationsdatum
16.06.2017
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-017-0573-5

Weitere Artikel der Ausgabe 3/2018

Peer-to-Peer Networking and Applications 3/2018 Zur Ausgabe