SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 7722, ISSN (Print): 2319 – 7714
www.ijhssi.org Volume 2 Issue 6 ǁ June. 2013ǁ PP.42-47
www.ijesi.org 42 | P a g e
Attack Library Based Intrusion Detection System to Secure
Manets
Shashank Kumar Chaudhary 1
,Bramah Hazela 2
(1
Department of computer science and engineering, Amity University, Lucknow, India)
(2
Assistant Professor, Department of computer science and engineering, Amity University, Lucknow, India)
ABSTRACT: A mobile ad hoc network is a wireless network which is also infrastructure less network, these
networks are self-configuring. Due to lack of infrastructure and central management, the security issues are the
important concern. In this paper author have proposed a model which provides certificate based authentication
and attack library based Intrusion detection system. Certificate based authentication helps to establish a secure
connection, whereas attack library based intrusion detection system provide facility to detect the malicious node
present in the network.
KEYWORDS: Dynamic certificate Authority, Intrusion Detection System, mobile ad hoc networks.
I. INTRODUCTION
A mobile ad hoc networks are the wireless network with the collection of mobile nodes. The mobile
nodes are connected in to each other during communication .The mobile nodes in the network can move up to a
range during the communication. The intermediate mobile nodes in the network act as the mobile agent. The
mobile nodes in the MANETs may be with bi-directional or unidirectional links .Each node in the network act
as the router, transmitter or receiver. The mobile nodes operate in the network because they have their individual
battery power.
Fig.1 Mobile ad hoc network.
MANET follows different mobility models according to their temporal and spatial dependencies.
Mobility models used are: random waypoint, random point group mobility and freeway mobility model. Due to
the mobility of nodes the routing protocol performance affected. Due to the rapid growth of mobile gadgets such
as laptop, mobile phones, PDAs etc., MANET become the communication paradigm. Infrastructure network
based on the fixed base station which acts as access point (centralized point). Infrastructure less network are
wireless network, they are self-configuring so there is no centralized access point. MANETs was designed for
military application, natural disasters, data collection and virtual classes. MANETs are categories in two types:
open manet and closed manet. In open manet resources are shared among nodes to achieve different goal. In
closed manet resources are shared among nodes to achieve common goals .Security has become important issue
in the MANETs. Attacks in the adhoc network due to the presence of the malicious node. In this paper, MANET
security issue is tackled, namely to prevent the network from malicious node and to establish a secure
communication between the secure nodes.
II. BACKGROUND
MANET is a self-organizing network of mobile nodes. MANET does not have any fixed topology, due
to dynamic topology it is very difficult task to secure network topology. Several papers focused on the security
issues of the MANET.
D. Sterne, et al. [9], described a architecture for intrusion detection to secure MANET. The architecture
works in hierarchy it collects the detection data from leaves node and flow upward to the root node. To establish
Attack Library Based Intrusion Detection…
www.ijesi.org 43 | P a g e
a secure communication, the hierarchy automatically reconfigured itself based on network topology. A new
intrusion detection system name Enhanced Adaptive Acknowledgement (EAACK) was proposed by U.
Sharmila Begam,et al. [1].
EAACK is able to detect the malicious node based on report of misbehaving node. While detecting malicious
node, the EAACK does not affect network performance. S.Tamilarasan, et al. [5] describe the logical survey to
detect the malicious node based on their behaviour and pattern, and proposed the techniques used for detecting
misbehaving nodes. To establish a trust management by monitoring the other neighbor nodes Reijo Savola [8]
has proposed a model, and also describe the security metrices used in MANET.
III. PROBLEM DOMAIN
In many research work different techniques have been proposed for detecting misbehaving nodes.
Detecting misbehaving node through proposed techniques is a time consuming process. These techniques are
time consuming because they are applied one by one to detect misbehaving node. To overcome this problem
author have proposed an attack library based intrusion detection system. Dynamic certificate authority based
authentication model is proposed to establish a secure communication between the nodes.
IV. BEHAVIORAL CHARACTERISTICS OF NODE IN MANETS
In MANET nodes act as receiver and transmitter within communication range. Source node
communicates to destination node through intermediate nodes present in the network. Attacker aims to attack
the network through these intermediate nodes by making these nodes malicious.
Malicious nodes tend to cause fallowing attacks:
A.) Black-Hole Attack
Fig.2 Black hole attack.
In this attack the malicious node advertise or shows itself, having the shortest path to the destination
node whose packets it wants to hamper. For e.g. in the above figure N2 (malicious node) in the network
advertise itself to have shortest path to the destination node. So N2 node wants to interrupt destination node
packet.
B. Worm-Hole Attack
The attacker creates a tunnel at malicious node so that when malicious node receives a packet it drops the packet
through tunnel.
Fig.3 Worm hole attack.
For e.g. in the above figure the node N4 (Malicious node) creates a tunnel. When node N4 receives a packet
then it drops through the tunnel.
Attack Library Based Intrusion Detection…
www.ijesi.org 44 | P a g e
C. Spoofing Attack
Misbehaving node hires the identity of another node and receives all the packets or messages of that node.
D. Denial of Service
The attacker node exploits the bandwidth of the network .The attacker node (malicious node) generates
unnecessary route requests so that to make network resources unavailable to authentic nodes.
E. Energy Consumption
Mobile nodes in MANETs have limited battery backup. So the mobile nodes save their battery power by
transmitting only necessary data. In this attack, attacker aims to consume the power of battery by routing
unnecessary packets to other nodes.
F. Information Disclosure
In MANETs the data flow in the network in the form of packets. When the data is processed information is
produced. In this attack the attacker attempts to destroy the confidentiality, integrity or availability of the data.
 Attacks on confidentiality:
The attacker aims to disclose the confidential data of the data packet, which is only accessible by the
authorized node.
 Attacks on integrity:
The integrity of the packet is lost. The attacker, alter the data packets by modification and removal of data
packet content.
 Attacks on availability:
In this attack the attacker node routes huge amount of unnecessary traffic to make network resources
unavailable to other nodes.
V. INTRUSION DETECTION SYSTEM (IDS)
In any network intrusion detection system (IDS) monitors activities of both user and program. Intrusion
detection can be done in two ways: Network based intrusion detection and Host based intrusion detection.
Network based intrusion detection runs at the gateway of the network and monitor and captures all the
information about packet that passes through that gateway whereas host based intrusion detection system runs
on the operating system and monitors all the program and event performed by the user or host.
A. Attack Library Based Intrusion Detection System
An attack library is the collection of types and patterns of attacks. Varying components of attack library based
intrusion detection system are as follows:
 Analyzer:
The work of analyzer is to analyze and monitor the node in the network. Analyzer fallows two
methodologies for detection: misuse and anomaly detection.
Misuse detection is based on the pattern, in this detection the node pattern in terms of their event
sequence is monitor. Anomaly detection is based on the behavior monitoring, the node behavior deviations is
compared with normal behavior, if there is change then the analyzer record it.
 Attack Library:
Attack library is a collection of well-organized designed attacks and test cases. It also provides facility
to generate new test cases for new attacks. Attacks are organized in the hierarchy structure. The attack library
uses these patterns and behavior to construct the test cases. The attack library works on a step of designed test
cases. The attack library generates response on the given input. It also generates the UID (unique ID) for the
authentic node. Attack library also monitors the behavior and pattern of directly attached node.
 Certificate Authority:
Certificate authority is the trusted authority that can be used for issuing certificate to make secure
communication .The certificate consists of UID, block signed by certificate authority, Key .UID in the
certificate is generated by the attack library after verification of node that it is not a malicious node.
Attack Library Based Intrusion Detection…
www.ijesi.org 45 | P a g e
Fig.4 Attack Library based intrusion detection system
Steps involved in attack library based intrusion detection system are:
1. Node A activates the analyzer with information to monitor node B.
2. Node A sends a request to node B to establish a communication path.
3. Node B send acknowledgement to node A. Node B send acknowledgement to ensure that he has received
the request. Node B sends a message with acknowledgement whether he wants to establish a connection or
not.
4. Analyzer analyzing Node B during the step-2 & 3. Analyzer sends report of Node B to Node A.
5. Node A sends report and acknowledgement of node B. Node A sends ACK of Node B because it contains
network parameters like response time etc.
6. Attack library response with a message and UID (unique ID) of both nodes A & B. Message contains
information about node B where it is a malicious node or not. The UID is generated by attack library only
when the node is not a malicious node. If it is malicious then Node A broadcast a message in the network
that Node b is malicious. Here attack library monitor node A (direct attached to attack library) after getting
report and acknowledgement of node B. Attack library monitor requesting node (node A) to check it is
malicious or not.
7. Sends UID to certificate authority
VI. DYNAMIC CERTIFICATE AUTHORITY BASED AUTHENTICATION
Fig.5 Dynamic Certificate Authority.
Attack Library Based Intrusion Detection…
www.ijesi.org 46 | P a g e
Dynamic certificate authority is the collection of node UID and its work is to issue certificate to
establish a secure communication between the nodes. The UID is used by certificate authority during issuing
certificate. UID is generated by the attack library during intrusion detection. Due to the concept of attack library
based UID generation only authorized nodes in the network can request for a certificate from certificate
authority. In the above diagram C(A) is certificate of node A, C(B) is certificate of node B, PRath is private key
of certificate authority, T(A) is time stamp for node A certificate, T(B) is the time stamp for node B certificate,
PUa and PUb are the public key of node A and B. Steps involved in Dynamic certificate authority to issue a
certificate are:
1. Node A sends a request to node B to establish a connection.
2. Node B asks for certificate from Node A.
3. Node A send request to certificate Authority to generate certificate of node A and also send public key of A.
4. Certificate authority send certificate to node A which includes UID, Time stamp of node A and public
key of A. The certificate is encrypted by certificate authority using its own private key.
5. Node A receives certificate and decrypt certificate using the public key of certificate authority. Node A
checks for time stamp T (A) to conform that the certificate is not old. Then send C (A) to node B and
request for B certificate.
6. Then node B send request to certificate authority to generate certificate C (B) and also sends his own public
key PUb .
7. Certificate authority generates certificate and encrypt with its own private key and send to node B.
8. Node B decrypts certificate using public key of certificate authority and checks time stamp. Then node B
send certificate C (B) to node A.
After exchanging certificate of each other node A and node B can establish a secure communication.
In proposed model Dynamic certificate Authority the name dynamic is used because the certificate authority
database is transfer to another authentic node present in the network. The certificate authority maintains a
priority list of nodes on the basis of number of times the node has requested for the certificate. The certificate
authority selects that node which has less time requested for certificate because that node power energy backup
is more than the other busy nodes present in network.
Fig.6 Transfer of certificate authority database.
1. Steps involved during the transfer of certificate authority database are:
2. Certificate authority selects the node from priority list to which he wants to transfer the certificate authority
database. After selecting the node certificate authority send request for UID of node X.
3. The node X response to the request and send UID to certificate authority.
4. Certificate authority checks for the UID and conform that the node is authentic or correct one. Then
certificate authority send a message to node X which include that he wants to establish a connection and
attach a time stamp that is used maintain a session for given period of time.
5. Node X sends conformation message.
6. Certificate authority transfer database to node X.
7. Certificate authority update attack library with the UID of new certificate authority.
8. After all these process the Node X acts as the new certificate authority.
Attack Library Based Intrusion Detection…
www.ijesi.org 47 | P a g e
VII. CONCLUSION
This paper focuses on security measures to secure MANETs from attacker. The proposed model which
is based on Attack library based intrusion detection system, helps in detecting the malicious node to secure the
network. Further dynamic certificate authority based authentication model have been proposed which is used to
make an trusted communication between the nodes by using exchanging certificate.
VIII. FUTURE SCOPE
Many research has been done and going on the security of MANET. Moreover the proposed security
model is used to detect the malicious node and to make a secure communication. Our future work will include
the further exploration of attack library i.e. patterns, test cases and to implement the proposed model using
simulator.
IX. ACKNOWLEDGMENT
I would like to thanks Maj. K.K. Ohri (AVSM), Pro.V.C, Amity University, Lucknow Campus. I would
like to further extend my sincere gratitude to Prof. S.T.H. Abdi, Director(ASET) , and Brig. Umesh Chopra,
Deputy Director (ASET), Amity University, Lucknow Campus for their encouragement. I am extremely grateful
to Prof.Deepak Arora, head of computer science and engineering department for this insightful comment. I would
like to express my sincere thanks to Bramah Hazela , Assistant professor , Department of computer science and
engineering ,Amity University Lucknow.
REFERENCES
[1]. U. SharmilaBegam, Dr. G. Murugaboopathi, “A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS” in
International Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1, January 2013.
[2]. DilipVishwakarma, Deepak Chopra, “International Journal of Engineering and Advanced Technology” in Volume-1, Issue-6,
August 2012.
[3]. Mohammed Mujeeb, Sudhakar K N, JitendranathMungara, “Reputation-Based Security Protocol for MANETs” in International
Journal of Innovative Technology and Exploring EngineeringVolume-1, Issue-2, July 2012.
[4]. Chandreyee Chowdhury, SarmisthaNeogy, “SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING
TRUST” in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011.
[5]. S. Tamilarasan and Dr. Aramudan, “A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection
System” in International Journal of Computer 258 Science and Network Security, VOL.11 No.5, May 2011.
[6]. N.Jaisankar, K.DuraiSwamy “A Novel security framework for protecting Network Layer operations in MANET” in International
Journal of Engineering and Technology Vol.1,No.5,December, 2009.
[7]. S. Madhavi, Dr. Tai Hoon Kim, “AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOCNETWORKS” in
International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.
[8]. Reijo Savola, “Node-Level Information Security Monitoring for Mobile Ad Hoc Networks” in Proceedings of the ETRICS'06
Workshop on Security in Autonomous Systems, 2006.
[9]. D. Sterne, P. Balasubramanyam, D. Carman1, B. Wilson, R. Talpade, C. Ko,R. Balupari, C-Y. Tseng2, T. Bowen, K. Levitt and
J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs” in Third IEEE International Workshop on
Information Assurance ,2005.
[10]. RicardoPuttini, Rafael de Sousa, LudovicMé, “Combining Certification-based Authentication and Intrusion Detection toSecure
Manet Routing Protocols” in Proceedings of the European Wireless Conference Mobile and Wireless Systems Beyond 3G ,2004.
[11]. Y. Huang and W. Lee, “A cooperative intrusion detection system for ad hoc networks,” in Proc. ACM Workshop onSecurity in
Ad Hoc and Sensor Networks (SASN'03),October 2003.
[12]. S. Capkun, L. Buttyan, and J. P. Hubaux.“Self-organized public key management for mobile ad hoc networks” in IEEE
Transactions on Mobile Computing, page 17, 2003.

Weitere ähnliche Inhalte

Was ist angesagt?

Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningeSAT Publishing House
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONIJITE
 

Was ist angesagt? (16)

Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
M026075079
M026075079M026075079
M026075079
 

Ähnlich wie G0262042047

Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 

Ähnlich wie G0262042047 (20)

A05510105
A05510105A05510105
A05510105
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
M0704071074
M0704071074M0704071074
M0704071074
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
G011123539
G011123539G011123539
G011123539
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
574 501-507
574 501-507574 501-507
574 501-507
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
N44096972
N44096972N44096972
N44096972
 

Kürzlich hochgeladen

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

G0262042047

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 7722, ISSN (Print): 2319 – 7714 www.ijhssi.org Volume 2 Issue 6 ǁ June. 2013ǁ PP.42-47 www.ijesi.org 42 | P a g e Attack Library Based Intrusion Detection System to Secure Manets Shashank Kumar Chaudhary 1 ,Bramah Hazela 2 (1 Department of computer science and engineering, Amity University, Lucknow, India) (2 Assistant Professor, Department of computer science and engineering, Amity University, Lucknow, India) ABSTRACT: A mobile ad hoc network is a wireless network which is also infrastructure less network, these networks are self-configuring. Due to lack of infrastructure and central management, the security issues are the important concern. In this paper author have proposed a model which provides certificate based authentication and attack library based Intrusion detection system. Certificate based authentication helps to establish a secure connection, whereas attack library based intrusion detection system provide facility to detect the malicious node present in the network. KEYWORDS: Dynamic certificate Authority, Intrusion Detection System, mobile ad hoc networks. I. INTRODUCTION A mobile ad hoc networks are the wireless network with the collection of mobile nodes. The mobile nodes are connected in to each other during communication .The mobile nodes in the network can move up to a range during the communication. The intermediate mobile nodes in the network act as the mobile agent. The mobile nodes in the MANETs may be with bi-directional or unidirectional links .Each node in the network act as the router, transmitter or receiver. The mobile nodes operate in the network because they have their individual battery power. Fig.1 Mobile ad hoc network. MANET follows different mobility models according to their temporal and spatial dependencies. Mobility models used are: random waypoint, random point group mobility and freeway mobility model. Due to the mobility of nodes the routing protocol performance affected. Due to the rapid growth of mobile gadgets such as laptop, mobile phones, PDAs etc., MANET become the communication paradigm. Infrastructure network based on the fixed base station which acts as access point (centralized point). Infrastructure less network are wireless network, they are self-configuring so there is no centralized access point. MANETs was designed for military application, natural disasters, data collection and virtual classes. MANETs are categories in two types: open manet and closed manet. In open manet resources are shared among nodes to achieve different goal. In closed manet resources are shared among nodes to achieve common goals .Security has become important issue in the MANETs. Attacks in the adhoc network due to the presence of the malicious node. In this paper, MANET security issue is tackled, namely to prevent the network from malicious node and to establish a secure communication between the secure nodes. II. BACKGROUND MANET is a self-organizing network of mobile nodes. MANET does not have any fixed topology, due to dynamic topology it is very difficult task to secure network topology. Several papers focused on the security issues of the MANET. D. Sterne, et al. [9], described a architecture for intrusion detection to secure MANET. The architecture works in hierarchy it collects the detection data from leaves node and flow upward to the root node. To establish
  • 2. Attack Library Based Intrusion Detection… www.ijesi.org 43 | P a g e a secure communication, the hierarchy automatically reconfigured itself based on network topology. A new intrusion detection system name Enhanced Adaptive Acknowledgement (EAACK) was proposed by U. Sharmila Begam,et al. [1]. EAACK is able to detect the malicious node based on report of misbehaving node. While detecting malicious node, the EAACK does not affect network performance. S.Tamilarasan, et al. [5] describe the logical survey to detect the malicious node based on their behaviour and pattern, and proposed the techniques used for detecting misbehaving nodes. To establish a trust management by monitoring the other neighbor nodes Reijo Savola [8] has proposed a model, and also describe the security metrices used in MANET. III. PROBLEM DOMAIN In many research work different techniques have been proposed for detecting misbehaving nodes. Detecting misbehaving node through proposed techniques is a time consuming process. These techniques are time consuming because they are applied one by one to detect misbehaving node. To overcome this problem author have proposed an attack library based intrusion detection system. Dynamic certificate authority based authentication model is proposed to establish a secure communication between the nodes. IV. BEHAVIORAL CHARACTERISTICS OF NODE IN MANETS In MANET nodes act as receiver and transmitter within communication range. Source node communicates to destination node through intermediate nodes present in the network. Attacker aims to attack the network through these intermediate nodes by making these nodes malicious. Malicious nodes tend to cause fallowing attacks: A.) Black-Hole Attack Fig.2 Black hole attack. In this attack the malicious node advertise or shows itself, having the shortest path to the destination node whose packets it wants to hamper. For e.g. in the above figure N2 (malicious node) in the network advertise itself to have shortest path to the destination node. So N2 node wants to interrupt destination node packet. B. Worm-Hole Attack The attacker creates a tunnel at malicious node so that when malicious node receives a packet it drops the packet through tunnel. Fig.3 Worm hole attack. For e.g. in the above figure the node N4 (Malicious node) creates a tunnel. When node N4 receives a packet then it drops through the tunnel.
  • 3. Attack Library Based Intrusion Detection… www.ijesi.org 44 | P a g e C. Spoofing Attack Misbehaving node hires the identity of another node and receives all the packets or messages of that node. D. Denial of Service The attacker node exploits the bandwidth of the network .The attacker node (malicious node) generates unnecessary route requests so that to make network resources unavailable to authentic nodes. E. Energy Consumption Mobile nodes in MANETs have limited battery backup. So the mobile nodes save their battery power by transmitting only necessary data. In this attack, attacker aims to consume the power of battery by routing unnecessary packets to other nodes. F. Information Disclosure In MANETs the data flow in the network in the form of packets. When the data is processed information is produced. In this attack the attacker attempts to destroy the confidentiality, integrity or availability of the data.  Attacks on confidentiality: The attacker aims to disclose the confidential data of the data packet, which is only accessible by the authorized node.  Attacks on integrity: The integrity of the packet is lost. The attacker, alter the data packets by modification and removal of data packet content.  Attacks on availability: In this attack the attacker node routes huge amount of unnecessary traffic to make network resources unavailable to other nodes. V. INTRUSION DETECTION SYSTEM (IDS) In any network intrusion detection system (IDS) monitors activities of both user and program. Intrusion detection can be done in two ways: Network based intrusion detection and Host based intrusion detection. Network based intrusion detection runs at the gateway of the network and monitor and captures all the information about packet that passes through that gateway whereas host based intrusion detection system runs on the operating system and monitors all the program and event performed by the user or host. A. Attack Library Based Intrusion Detection System An attack library is the collection of types and patterns of attacks. Varying components of attack library based intrusion detection system are as follows:  Analyzer: The work of analyzer is to analyze and monitor the node in the network. Analyzer fallows two methodologies for detection: misuse and anomaly detection. Misuse detection is based on the pattern, in this detection the node pattern in terms of their event sequence is monitor. Anomaly detection is based on the behavior monitoring, the node behavior deviations is compared with normal behavior, if there is change then the analyzer record it.  Attack Library: Attack library is a collection of well-organized designed attacks and test cases. It also provides facility to generate new test cases for new attacks. Attacks are organized in the hierarchy structure. The attack library uses these patterns and behavior to construct the test cases. The attack library works on a step of designed test cases. The attack library generates response on the given input. It also generates the UID (unique ID) for the authentic node. Attack library also monitors the behavior and pattern of directly attached node.  Certificate Authority: Certificate authority is the trusted authority that can be used for issuing certificate to make secure communication .The certificate consists of UID, block signed by certificate authority, Key .UID in the certificate is generated by the attack library after verification of node that it is not a malicious node.
  • 4. Attack Library Based Intrusion Detection… www.ijesi.org 45 | P a g e Fig.4 Attack Library based intrusion detection system Steps involved in attack library based intrusion detection system are: 1. Node A activates the analyzer with information to monitor node B. 2. Node A sends a request to node B to establish a communication path. 3. Node B send acknowledgement to node A. Node B send acknowledgement to ensure that he has received the request. Node B sends a message with acknowledgement whether he wants to establish a connection or not. 4. Analyzer analyzing Node B during the step-2 & 3. Analyzer sends report of Node B to Node A. 5. Node A sends report and acknowledgement of node B. Node A sends ACK of Node B because it contains network parameters like response time etc. 6. Attack library response with a message and UID (unique ID) of both nodes A & B. Message contains information about node B where it is a malicious node or not. The UID is generated by attack library only when the node is not a malicious node. If it is malicious then Node A broadcast a message in the network that Node b is malicious. Here attack library monitor node A (direct attached to attack library) after getting report and acknowledgement of node B. Attack library monitor requesting node (node A) to check it is malicious or not. 7. Sends UID to certificate authority VI. DYNAMIC CERTIFICATE AUTHORITY BASED AUTHENTICATION Fig.5 Dynamic Certificate Authority.
  • 5. Attack Library Based Intrusion Detection… www.ijesi.org 46 | P a g e Dynamic certificate authority is the collection of node UID and its work is to issue certificate to establish a secure communication between the nodes. The UID is used by certificate authority during issuing certificate. UID is generated by the attack library during intrusion detection. Due to the concept of attack library based UID generation only authorized nodes in the network can request for a certificate from certificate authority. In the above diagram C(A) is certificate of node A, C(B) is certificate of node B, PRath is private key of certificate authority, T(A) is time stamp for node A certificate, T(B) is the time stamp for node B certificate, PUa and PUb are the public key of node A and B. Steps involved in Dynamic certificate authority to issue a certificate are: 1. Node A sends a request to node B to establish a connection. 2. Node B asks for certificate from Node A. 3. Node A send request to certificate Authority to generate certificate of node A and also send public key of A. 4. Certificate authority send certificate to node A which includes UID, Time stamp of node A and public key of A. The certificate is encrypted by certificate authority using its own private key. 5. Node A receives certificate and decrypt certificate using the public key of certificate authority. Node A checks for time stamp T (A) to conform that the certificate is not old. Then send C (A) to node B and request for B certificate. 6. Then node B send request to certificate authority to generate certificate C (B) and also sends his own public key PUb . 7. Certificate authority generates certificate and encrypt with its own private key and send to node B. 8. Node B decrypts certificate using public key of certificate authority and checks time stamp. Then node B send certificate C (B) to node A. After exchanging certificate of each other node A and node B can establish a secure communication. In proposed model Dynamic certificate Authority the name dynamic is used because the certificate authority database is transfer to another authentic node present in the network. The certificate authority maintains a priority list of nodes on the basis of number of times the node has requested for the certificate. The certificate authority selects that node which has less time requested for certificate because that node power energy backup is more than the other busy nodes present in network. Fig.6 Transfer of certificate authority database. 1. Steps involved during the transfer of certificate authority database are: 2. Certificate authority selects the node from priority list to which he wants to transfer the certificate authority database. After selecting the node certificate authority send request for UID of node X. 3. The node X response to the request and send UID to certificate authority. 4. Certificate authority checks for the UID and conform that the node is authentic or correct one. Then certificate authority send a message to node X which include that he wants to establish a connection and attach a time stamp that is used maintain a session for given period of time. 5. Node X sends conformation message. 6. Certificate authority transfer database to node X. 7. Certificate authority update attack library with the UID of new certificate authority. 8. After all these process the Node X acts as the new certificate authority.
  • 6. Attack Library Based Intrusion Detection… www.ijesi.org 47 | P a g e VII. CONCLUSION This paper focuses on security measures to secure MANETs from attacker. The proposed model which is based on Attack library based intrusion detection system, helps in detecting the malicious node to secure the network. Further dynamic certificate authority based authentication model have been proposed which is used to make an trusted communication between the nodes by using exchanging certificate. VIII. FUTURE SCOPE Many research has been done and going on the security of MANET. Moreover the proposed security model is used to detect the malicious node and to make a secure communication. Our future work will include the further exploration of attack library i.e. patterns, test cases and to implement the proposed model using simulator. IX. ACKNOWLEDGMENT I would like to thanks Maj. K.K. Ohri (AVSM), Pro.V.C, Amity University, Lucknow Campus. I would like to further extend my sincere gratitude to Prof. S.T.H. Abdi, Director(ASET) , and Brig. Umesh Chopra, Deputy Director (ASET), Amity University, Lucknow Campus for their encouragement. I am extremely grateful to Prof.Deepak Arora, head of computer science and engineering department for this insightful comment. I would like to express my sincere thanks to Bramah Hazela , Assistant professor , Department of computer science and engineering ,Amity University Lucknow. REFERENCES [1]. U. SharmilaBegam, Dr. G. Murugaboopathi, “A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS” in International Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1, January 2013. [2]. DilipVishwakarma, Deepak Chopra, “International Journal of Engineering and Advanced Technology” in Volume-1, Issue-6, August 2012. [3]. Mohammed Mujeeb, Sudhakar K N, JitendranathMungara, “Reputation-Based Security Protocol for MANETs” in International Journal of Innovative Technology and Exploring EngineeringVolume-1, Issue-2, July 2012. [4]. Chandreyee Chowdhury, SarmisthaNeogy, “SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST” in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011. [5]. S. Tamilarasan and Dr. Aramudan, “A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System” in International Journal of Computer 258 Science and Network Security, VOL.11 No.5, May 2011. [6]. N.Jaisankar, K.DuraiSwamy “A Novel security framework for protecting Network Layer operations in MANET” in International Journal of Engineering and Technology Vol.1,No.5,December, 2009. [7]. S. Madhavi, Dr. Tai Hoon Kim, “AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOCNETWORKS” in International Journal of Security and Its Applications Vol. 2, No.3, July, 2008. [8]. Reijo Savola, “Node-Level Information Security Monitoring for Mobile Ad Hoc Networks” in Proceedings of the ETRICS'06 Workshop on Security in Autonomous Systems, 2006. [9]. D. Sterne, P. Balasubramanyam, D. Carman1, B. Wilson, R. Talpade, C. Ko,R. Balupari, C-Y. Tseng2, T. Bowen, K. Levitt and J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs” in Third IEEE International Workshop on Information Assurance ,2005. [10]. RicardoPuttini, Rafael de Sousa, LudovicMé, “Combining Certification-based Authentication and Intrusion Detection toSecure Manet Routing Protocols” in Proceedings of the European Wireless Conference Mobile and Wireless Systems Beyond 3G ,2004. [11]. Y. Huang and W. Lee, “A cooperative intrusion detection system for ad hoc networks,” in Proc. ACM Workshop onSecurity in Ad Hoc and Sensor Networks (SASN'03),October 2003. [12]. S. Capkun, L. Buttyan, and J. P. Hubaux.“Self-organized public key management for mobile ad hoc networks” in IEEE Transactions on Mobile Computing, page 17, 2003.