Performance Study of Intrusion Detection Techniques in Mobile Ad Hoc Networks

Performance Study of Intrusion Detection Techniques in Mobile Ad Hoc Networks

International Journal of Engineering and Techniques – Volume 1 Issue 2, Mar – Apr 2015

ISSN: 2395-1303 http://www.ijetjournal.org Page 9

R.M.Chamundeeswari, Asst. Professor1, Dr.P.Sumathi, Asst. Professor2

Department of Computer Applications, PG & Research Department of Computer Science

Asan Memorial College of Arts & Science, Chennai. Government Arts College, Coimbatore-18.

Introduction

The mobile nodes dynamically self-structured into random topology networks devoid of a fixed infrastructure. Designing dynamic routing protocols with high-quality performance and minimal overhead is a primary demand of mobile ad hoc networks. Intrusion detection and response capability is extremely significant, especially as many real ad hoc networks operate in aggressive environments. Genuine nodes can be captured and exploited by adversaries.

Two methods for detecting intrusion include:

  • Misuse-based intrusion detection (knowledge-based detection)
  • Anomaly-based intrusion detection (behavior-based detection)

Misuse intrusion detection involves detecting intrusions by defining them beforehand and monitoring for their occurrence. Fig. 1 represents the intrusion detection structures of mobile ad hoc network systems.

Fig 1. Architecture of IDS

Abstract

The mobile ad hoc network is an infrastructure-less system of mobility appliances connected wirelessly. System protection violations cannot always be prevented using access and information flow control due to system software and hardware failures, organizational actions, or verification module failures. Intrusion detection is vital for detecting system abuse. An intrusion detection system detects intruder and abuser actions efficiently and reasonably. Intruders compromising mobile nodes in MANET eliminate communication between nodes by disseminating fake routing information and excessive traffic.

MANETs are vulnerable to several types of attacks, including passive eavesdropping, active impersonation, and denial of services. Effective implementation depends on user confidence in its security. Security research in MANETs has focused on key management, routing protocols, and intrusion detection techniques. This paper reviews various intrusion detection and prevention systems for MANETs and compares the latest techniques based on architecture and data collection methods.

Post Comment