Open Access   Article Go Back

A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks

A. Chaudhary1 , G. Shrimal2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 890-898, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.890898

Online published on Aug 31, 2018

Copyright © A. Chaudhary, G. Shrimal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Chaudhary, G. Shrimal, “A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.890-898, 2018.

MLA Style Citation: A. Chaudhary, G. Shrimal "A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 6.8 (2018): 890-898.

APA Style Citation: A. Chaudhary, G. Shrimal, (2018). A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 6(8), 890-898.

BibTex Style Citation:
@article{Chaudhary_2018,
author = {A. Chaudhary, G. Shrimal},
title = {A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {890-898},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2791},
doi = {https://doi.org/10.26438/ijcse/v6i8.890898}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.890898}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2791
TI - A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - A. Chaudhary, G. Shrimal
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 890-898
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
463 378 downloads 209 downloads
  
  
           

Abstract

Mobile Ad hoc networks (MANETs) provide autonomous communication between the mobile nodes in the absence of predefined infrastructure. This property of MANETs makes it more vulnerable from conventional networks. Due to this reason, prevention mechanism such as authentication and cryptography techniques alone are not capable to protect it so that intrusion detection system (IDS) employed to facilitate the identification of intrusions in MANETs. This paper examined the detailed analysis on each class of intrusion detection systems that have been proposed in MANETs for preventing the network layer attacks and also focuses the further research areas in MANETs.

Key-Words / Index Term

Mobile Ad hoc Networks (MANETs), Security Issues, Intrusion Detection System (IDS), Detection Architecture and Detection Techniques

References

[1] IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF web-site www.ietf.org/dyn/wg/charter/manet-charter.html.
[2] IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF website http://datatracker.ietf.org/wg/autoconf/charter/
[3] IEEE Std 802.11-2007, “IEEE standard for information technology-Telecommunication and information exchange between systems- Local and metropolitan area network-Specific requirement, Part 11 Wireless LAN medium access control and physical layer specifications”, June 2007.
[4] Chaudhary, Alka, V. N. Tiwari, and Anil Kumar. "A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets." International Journal of Network Security 18, no. 3, 514-522, 2016.
[5] Chaudhary, A., V. N. Tiwari, and A. Kumar. "Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks." BVICA M`s International Journal of Information Technology 6.1, 2014.
[6] Chaudhary, Alka. "Neuro-fuzzy based intrusion detection systems for network security." Journal of Global Research in Computer Science 5.1, pp. 1-2, 2014.
[7] Lundin E., Jonsson E., “Survey of Intrusion Detection Research”, Technical report 02-04, Dept. of Computer Engineering, Chalmers University of Technology, (2002).
[8] Kim J., P. Bentley, "The Artificial Immune Model for Network Intrusion Detection", In 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT’99). Aachen, Germany. September 1999.
[9] Uppuluri P., Sekar R., “Experiences with Specification-based Intrusion Detection. In Proc of the 4th Int Symp on Recent Adv in Intrusion Detect LNCS 2212: 172-189, 2001.
[10] Tseng C-Y, Balasubramayan P. et al., “A Specification-Based Intrusion Detection System for AODV” , In Proc of the ACM Workshop on Secur in Ad Hoc and Sens Netw (SASN), 2003.
[11] Huang Y., Lee W., “Attack Analysis and Detection for Ad Hoc Routing Protocols”, In Proc of Recent Adv in Intrusion Detect LNCS 3224:125-145, 2004.
[12] Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F., “ Wang, Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure," Proceedings of DARPA Information Survivability Conference and Exposition, Vol. 2, pp. 69-83, January 2000.
[13] Sevil Şen, John A. Clark “Intrusion detection in mobile ad hoc networks”, In Chapter 17, Guide to Wireless Ad Hoc Networks, Springer, 2008.
[14] P. Brutch and C. Ko, “Challenges in Intrusion Detection for Wireless Ad-hoc Networks," Proceedings of 2003 Symposium on Applications and the Internet Workshop, pp. 368-373, January 2003.
[15] Y. Zhang and W. Lee., “ Intrusion detection in wireless ad hoc networks” , In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom`00), pages 275-283, 2000.
[16] Y. Zhang, W. Lee, and Y. Huang, “Intrusion detection techniques for mobile wireless networks”, In wireless Networks Journal (ACM WINET), September 2003.
[17] A.B. Smith, “An examination of an intrusion detection architecture for wireless ad hoc networks” , In Proceedings of the 5th National Colloquium for Information System Security Education, 2001.
[18] Y. Huang, Wei Fan, Wenke Lee, and Philip S. Yu, “Cross-feature analysis for detection ad-hoc routing anomalies”, In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS).
[19] Y. Huang and W. Lee., ”A cooperative intrusion detection system for ad hoc net-works”, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
[20] B. Sun, K. Wu, and U.W. Pooch, “Zone-based intrusion detection for mobile ad hoc networks”, International Journal of Ad Hoc and Sensor Wireless Networks, 2003.
[21] B. Sun, “Intrusion Detection in Mobile Ad Hoc Networks”, PhD thesis, Computer Science, Texas A&M University, 2004.
[22] O. Kachirski and R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks”, In Proceedings of the 36th IEEE International Conference on System Sciences, 2003.
[23] C.-Y. Tseng, P. Balasubramayan, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, “A specification-based intrusion detection system for AODV”, In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), 2003.
[24] E. Hansson, J. Gronkvist, K. Persson, and D. Nardquist, “Specification-based intrusion detection combined with cryptography methods for mobile ad hoc networks”, Technical report, FOI Swedish Defence Research Agency/Command and Control Systems, 2005.
[25] H.M. Hassan, M. Mahmoud, and S. El-Kassas, “ Securing the AODV protocol using specification-based intrusion detection”, In Proceedings of the 2nd ACM International Workshop on Quality of Service and Security for Wireless and Mobile Networks, pages 33-35, 2006.
[26] M. Wang, L. Lamont, P. Mason, and M. Gorlatova, “An effective intrusion detection approach for OLSR MANET protocol” ,In Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, pages 55{60, 2005.
[27] S. Sarafijanovic and J. Le Boudec, “An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors”, 2004, pp. 342- 356
[28] Y. Huang and Wenke Lee, “ Attack analysis and detection for ad hoc routing protocols” ,In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID`04), pages 125-145, Springer, 2004.
[29] Megat Farez Azril Bin Zuhairi, M., Mohammad Haseeb Zafar, and David Harle. "The impact of mobility models on the performance of mobile Ad Hoc network routing protocol", IETE Technical Review, Vol. 29, No. 5, pp. 414-420, 2012.
[30] Ping Yi, Yiping Zhong, Shiyong Zhang, “A novel intrusion detection method for mobile ad hoc networks in Proceeding EGC`05 Proceedings of the 2005 European conference on Advances in Grid Computing Pages 1183-1192 2005.
[31] J.-M. Orset, B. Alcalde, and A. R. Cavalli, “An EFSM-Based Intrusion Detection System for Ad Hoc Networks”, Proc. International Conference on Automated Technology for Verification and Analysis, pp 400–413, 2005.
[32] Dina Sadat Jalali, Alireza Shahrbanoonezhad, “ a new intrusion detection method based on fsm and cache memory in ad hoc networks”,In Proceedings of IEEE CCIS2011, 2011
[33] L. Yu, L. Yang, and M. Hong, “Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks,” in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, pp. 418-420, September 2005.
[34] S.Bose and A. Kannan, “Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks” ,Iin International Conference on Signal Processing, Communications and Networking, ICSCN `08, 2008.
[35] Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung-Jo Han, “A Novel Cross Layer Intrusion Detection System in MANET “, In 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
[36] C. J. John Felix, A. Das, B.C. Seet, and B.-S. Lee, “CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs,” in IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, CA, USA, pp. 1525-1530, March 2008.
[37] .H. Tseng, S.-H. Wang, Wenke Lee, C. Ko, and K. Lewitt, “Demem: Distributed evidence driven message exchange intrusion detection model for MANET”, In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID`06), pages 249-271. Springer, 2006.
[38] Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D, “MAC Layer Misbehavior in MANETs”, IETE Technical Review, Vo. 30, No. 4, 2013.
[39] C.H. Tseng, T. Song, P. Balasubramanyam, C. Ko, and K. Levitt, “A specification-based intrusion detection model for OLSR”,In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID`05), LNCS 3858, pages 330{350. Springer, 2005.
[40] A. Mitrokosta, N. Komninos and C. Douligeris, “Intrusion Detection with Neural Networks and Watermarking Techniques for MANETs”, In Proc. IEEE International Conference on Pervasive Services, pp 118-127, July 2007.
[41] Min-Hua Shao, Ji-Bin Lin, Yi-Ping Lee, “Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET in IEEE 10th International Conference on Computer an Information Technology (CIT), 2010.
[42] Zahra moradi Mohammad Teshnehlab Amir Masoud Rahmani, “ Implementation of Neural Networks for Intrusion Detection in MANET”, IN International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), 2011.
[43] Pasquale Donadio, Antonio Cimmino and Giorgio Ventre “Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid Based Agnostic Middleware” , In Proceeding AUPC `08 Proceedings of the 2nd international workshop on Agent-oriented software engineering.challenges for ubiquitous and pervasive computing Pages 15-20, 2008.
[44] S.Sen and John Andrew Clark “A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks”, In WiSec ’09: Proceedings of the Second ACM Conference on Wireless Network Security March 2009..
[45] S. Sen, J. A. Clark, and J. E. Tapiador, “Power-aware intrusion detection in mobile ad hoc networks”, in Ad Hoc Networks, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Berlin Heidelberg, vol. 28, pp. 224–239, 2010.
[46] Sujatha, K.S., “Design of genetic algorithm based IDS for MANET”, In IEEE International Conference on Recent Trends in Information Technology (ICRTIT), 28-33, 19-21 April 2012.
[47] Monita Wahengbam and Ningrinla Marchang, “Intrusion Detection in MANET using Fuzzy Logic”, In IEEE 3rd National Conference, pages 189-192 March 2012.
[48] Patidar, V., & Kumbhkar, M., “Analysis of Cloud Computing Security Issues in Software as a Service”, International Journal of Scientific Research in Computer Science and Engineering, 2(3), pp. 1-5, 2014.