Open Access   Article Go Back

A Dynamic Analysis Model for Intrusion Detection in Mobile Network

Lavlish Goyal1 , Nitika 2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 511-515, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.511515

Online published on Apr 30, 2019

Copyright © Lavlish Goyal, Nitika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Lavlish Goyal, Nitika, “A Dynamic Analysis Model for Intrusion Detection in Mobile Network,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.511-515, 2019.

MLA Style Citation: Lavlish Goyal, Nitika "A Dynamic Analysis Model for Intrusion Detection in Mobile Network." International Journal of Computer Sciences and Engineering 7.4 (2019): 511-515.

APA Style Citation: Lavlish Goyal, Nitika, (2019). A Dynamic Analysis Model for Intrusion Detection in Mobile Network. International Journal of Computer Sciences and Engineering, 7(4), 511-515.

BibTex Style Citation:
@article{Goyal_2019,
author = {Lavlish Goyal, Nitika},
title = {A Dynamic Analysis Model for Intrusion Detection in Mobile Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {511-515},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4067},
doi = {https://doi.org/10.26438/ijcse/v7i4.511515}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.511515}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4067
TI - A Dynamic Analysis Model for Intrusion Detection in Mobile Network
T2 - International Journal of Computer Sciences and Engineering
AU - Lavlish Goyal, Nitika
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 511-515
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
249 247 downloads 136 downloads
  
  
           

Abstract

A real time communication network having the open access features also suffers from various intruders. These intruders steal the communication information, disrupt the data or slow down the transmission. In this paper, a dynamic signature and parameter map based model is presented for intrusion detection. At earlier stage of this model, the log-event table map is performed to verify the authenticity of node. At this stage, the prevention from any external node is done under activity monitoring. In final stage, the communication observation under multiple parameters is done to identify the intrusion. The query pattern observation is applied in this stage to identify the attacked node and pattern. The proposed work model is simulated in NS2 environment with multiple query patterns. The observations show that the model has identified various attack patterns significantly.

Key-Words / Index Term

Signature, Query Pattern, Intrusion Detection, Activity Monitoring

References

[1] Axel Krings," Neighborhood Monitoring in Ad Hoc Networks", CSIIRW ’10, April 21-23, 2010, Oak Ridge, Tennessee, USA ACM 978-1-4503-0017-9
[2 Ying Li," Component-Based Track Inspection Using Machine-Vision Technology", ICMR’11, April 17-20, 2011, Trento, Italy ACM 978-1-4503-0336-1/11/04
[3] Bogdan Carbunar," JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks", WiSe’04, October 1, 2004, Philadelphia, Pennsylvania, USA. ACM 1-58113-925-X/04/0010
[4] Johann Schlamp," How to Prevent AS Hijacking Attacks", CoNEXT Student’12, December 10, 2012, Nice, France. ACM 978-1-4503-1779-5/12/12
[5] Joshua Goodman," Stopping Outgoing Spam", EC’04, May 17–20, 2004, New York, New York, USA. ACM 1-58113-711-0/04/0005
[6] Danny Dhillon," Implementation & Evaluation of an IDS to Safeguard OLSR Integrity in MANETs", IWCMC’06, July 3–6, 2006, Vancouver, British Columbia, Canada. ACM 1-59593-306-9/06/0007
[7] Ahmed Khurshid," VeriFlow: Verifying Network-Wide Invariants in Real Time", HotSDN’12, August 13, 2012, Helsinki, Finland. ACM 978-1-4503-1477-0/12/08
[8] Evan Cooke," Toward Understanding Distributed Blackhole Placement", WORM’04, October 29, 2004, Washington, DC, USA. ACM 1-58113-970-5/04/0010
[9] Umair Sadiq," CRISP: Collusion–Resistant Incentive–Compatible Routing and Forwarding in Opportunistic Networks", MSWiM’12, October 21–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1628-6/12/10
[10] Mauro Conti," A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks", MobiHoc’07, September 9-14, 2007, Montréal, Québec, Canada. ACM 978-1-59593-684-4/07/0009
[11] Garima Gupta," Reference based approach to Mitigate Blackhole Attacks in Delay Tolerant Networks", Q2SWinet’12, October 24–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1619-4/12/10