DOI QR코드

DOI QR Code

A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network

Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2018.02.20
  • Accepted : 2018.03.12
  • Published : 2018.03.30

Abstract

MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.

Keywords

References

  1. Butun, I., Morgere, S.D., Sankar, R., "A survey of intrusion detection system in wireless sensor networks," IEEE Communication System, Tutorials 16(1), 2014.
  2. Kaur, J., Lindskog, D., Zavarsky, P., "An algorithm to facilitate intrusion response in mobile ad hoc networks," Proceedings of the 9th International Conference on Security of Information and Networks, 2016.
  3. 고장혁, 이동호, "네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구," 디지털산업정보학회지, 제13권, 제4호, 2017, pp. 125-135.
  4. Nguyen, H.L., Nguyen, U.T., "A study of different types of attacks in mobile adhoc networks," 25th IEEE Canadian Conference on Electrical Computer Engineering(CCEC), 2012.
  5. 이세열, "자가적응모듈과 퍼지인식도가 적용된 하이브리드 침입시도탐지모델," 디지털산업정보학회지, 제13권, 제3호, 2017, pp. 19-25.
  6. 석선우, 최승원, "Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol," 디지털산업정보학회지, 제13권, 제1호, 2017, pp. 57-101.
  7. R. M. Chamudeeswari, P. Sumathi, "Security attacks on Routing protocols and Intrusion Detection in MANET," International Journal of Scientific Research and Management, Vol.5, 2015, pp. 7067-7073.
  8. Sahana, S., Saha, S., Das Gupta, S., " Weight based hierarchical clustering algorithm for mobile ad hoc networks," Procedia Eng., No. 38, 2012, pp. 1084-1093.
  9. Han-Chao Lee, Shin-Ming Cheng, Kuo-Ping Wu, "A responsive probing approach to detect dynamic intrusion in a MANET," IEEE, Vol. 3, No. 2, 2016, pp. 243-259.
  10. Badie, A.M., Lindskog, D., Zavarsky, P., "Responding to intrusions in mobile ad hoc networks," World Congress on Internet Security(WorldCIS-2013), 2013, pp. 30-34.
  11. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method," International Journal of Network Security, Vol.5, No.3, 2007, pp. 338-346.
  12. Latha Tamilselvan, V. Sankaranarayanan, "Prevention of Co-operative Black Hole Attack in MANET," International Journal of Networks, Vol. 3, No. 5, 2008, pp. 13-20.