Academia.eduAcademia.edu

Outline

FUZZY BASED MALICIOUS NODES DETECTION IN MOBILE AD-HOC NETWORKS

2018, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)

Abstract

In this paper, a Fuzzy based detection system that detects different MANETs attacks is proposed. The proposed system makes use of cluster based architecture to properly organize the nodes in the network. The proposed system use concept of anomaly detection and misuse detection that is based on fuzzy rule sets. The proposed system also makes use of Multilayer Perceptron Neural Network. The Back propagation Neural Network and Feed Forward Neural Network are used to add the results of detection and show the different types of attackers. Advanced Sybil Attack Detection Algorithm is used for the detection of Sybil attack, Wormhole Resistant Hybrid Technique is used for detection of wormhole attack while signal strength and distance is used for detection of hello flood attack. A set of nodes are used for the experimental analysis; 16.54% of the nodes are detected as misbehaving nodes. Hello flood attack is detected at a rate of 98.70%; wormhole attack has a detection rate of 97. 60%; and Sybil attack has a detection rate of 97. 20%.

References (24)

  1. AkanshaSaini and Harish Kumar "Effect of Black hole attack on AODV Routing Protocol in MANET", International Journal of Computer Technology, Vol. 1, no 2, December 2010.
  2. EktaKamboj, "Detection of black hole on AODV in MANET using fuzzy" Journal of current computer science and technology, vol. 1, no. 6, pp 316-318, 2011.
  3. Ganapathy S, Yogesh P and Kannan A "Intelligent agent based Intrusion Detection System", Hindawi Publishing Corporation, Computational Intelligence and Neuroscience, 2012.
  4. Hu Y, Perrig A and Johnson B, "A Secure on Demand Routing Protocol for Ad Hoc networks", Proceeding of MobiCom, pp. 23-28, September 2002.
  5. Hu Y, Perrig Y and Johnson B, "Rushing attack and Defences in Wireless Ad Hoc Networks Routing Protocols", Proceeding of 2nd ACM workshop on Wireless Security, New York, 2003.
  6. Jungwon Kim and Peter J. Bentley "The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator", 2001.
  7. Kurosawa S and Jamalipour A, "Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks", International Journal of Network Security , Vol. 5, November 2007.
  8. Nadeem A and Howarth M, "Adaptive intrusion detection & prevention of Denial of Service", Proceeding of ACM 5th International Wireless Communication Conference, Germany, June 2009.
  9. Padilla E, Aschenbruck N, Martini P and Tolle J, "Detecting Black Hole Attack in Tactical MANETs using Topology Graph", Proceeding of 32nd IEEE Conference on Local Computer Networks, 2007.
  10. Pirrete M and Brooks M, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence", International Journal of Distributed Sensor Networks, Vol.2, No.3, pp. 267-287, 2006.
  11. PoonamYadav, Rakesh Kumar Gill and Naveen Kumar, "A Fuzzy Based Approach To Detect Black Hole Attack", International Journal Of Soft Computing, ISSN: 2231-2307, vol. 2, no. 3, July 2012.
  12. Revathi B, Geetha D, "A Survey of Cooperative Black and Gray hole Attack in MANET", International Journal of Computer Science and Management Research, Vol 1, no 2, September 2012.
  13. ShanshanZheng, Tao Jian and John S: "Intrusion Detection of in-band wormholes in MANET using advanced statistical methods", IEEE 2008.
  14. SrinivasMukkamala, Guadalupe Janoski, Andrew Sung "Intrusion Detection Using Neural Networks and Support Vector Machines", in IEEE International Conference on Neural Networks, pp. 1702-1701, 2002.
  15. Steve Hofmeyr at all, "Intrusion Detection Using Sequences of Systems Call", Journal Of Computer Security, vol 6, pp 151-180, 1998.
  16. Susan Bridges and Rayford Vaughn, "Fuzzy Data Mining and Genetic Algorithms Applied To Intrusion Detection", Proceedings 23rd National Information Security Conference, pp 1-19, October 2000.
  17. Van Der Vorst H A, "Computational Methods for Large Eigenvalue Problems", in Handbook of Numerical Analysis, vol. 8, pp. 3-179, 2002.
  18. Vijayan R, Mareeswari V and Ramakrishna K "Energy based trust solution for detecting selfish nodes in MANET using fuzzy logic", International Journal of Research in computer, vol. 2 No. 3, June 2011.
  19. Wang Yu, "Using Fuzzy Expert System based on Genetic Algorithm for Intrusion Detection System", April 2009.
  20. Xiaopeng G and Wei C, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad Hoc Networks," Proceeding of IFIP International Conference on Network & Parallel Computing, 2007.
  21. Yi P, Dai Z and Zhang S, "Resisting Flooding Attack in Ad Hoc Networks", Proceeding of IEEE Conference on Information Technology: Coding and Computing", Vol.2, pp. 657-662, 2005.
  22. J Singh, O Singh and R Singh,"MRWDP: Multipoint Relays Based Watch Dog Monitoring And Prevention For Blackhole Attack In Mobile Adhoc Networks" Journal of Theoretical and Applied Information Technology, Vol. 95,pp.19,2017.
  23. J Singh, O Singh and R Singh," An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes" Indian journal of Science & Technology,Vol.10,pp.05,2017.
  24. Vijay .Dhir, R.Kumar and V.Joshi "Performance comparison of routing protocols in mobile ad hoc networks" International Journal of Engineering Science and Technology,Vol.2, pp. 3494-3502, 2010. Er. Harmeet Singh, Assistant Professor at Sant Baba Bhag Singh University,Khila Jalandhar,Harmeet Singh Completed B.tech in computer science & Engineering at S. Sukhjinder Singh College of Engg. & Technology and M.tech in computer Science & Engineering at K.C. College of Engineering and