Software and Hardware Implementation of Local Intrusion Detection Strategy

I. I. Saada, R. H. Sakr, M. Rashad
{"title":"Software and Hardware Implementation of Local Intrusion Detection Strategy","authors":"I. I. Saada, R. H. Sakr, M. Rashad","doi":"10.21608/mjcis.2018.312004","DOIUrl":null,"url":null,"abstract":"A mobile ad hoc network (MANET) has many undesirable challenges, black hole (BH) is one of the most significant challenges in MANET. Many researchers have proposed researches which depend on different strategies to face this challenge. The problem is how much the ability of these strategies to detect and block BH in order to empty the network from the threats, and how much these solutions could be implemented practically to treat with threats. However, the required strategy should also maintain network performance at the same time. The idea of this research has been applied on AODV based MANET, the strategy deals with cooperative black hole by using a deceptive message with virtual address that is not in the addresses range [1]. The main interest in this paper beside proposing the new idea, is to convert this idea into strategy by providing the necessary details, in addition to implement the strategy by hardware and software models. These models have been built in order to illustrate how black hole works and how the strategy can detect and block the black hole practically in AODV based MANET. This paper presents the method in an integrated manner. In this method, the detection process starts from the previous node, not from the source node. However, this method can choose the shortest path and can deal with more than one black hole. These additions will preserve the performance of network, the hardware model has been provided with liquid crystal displays LCD put on each node. LCD is used to appear each step, and to make the system full-acknowledgment.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mansoura Journal for Computer and Information Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/mjcis.2018.312004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A mobile ad hoc network (MANET) has many undesirable challenges, black hole (BH) is one of the most significant challenges in MANET. Many researchers have proposed researches which depend on different strategies to face this challenge. The problem is how much the ability of these strategies to detect and block BH in order to empty the network from the threats, and how much these solutions could be implemented practically to treat with threats. However, the required strategy should also maintain network performance at the same time. The idea of this research has been applied on AODV based MANET, the strategy deals with cooperative black hole by using a deceptive message with virtual address that is not in the addresses range [1]. The main interest in this paper beside proposing the new idea, is to convert this idea into strategy by providing the necessary details, in addition to implement the strategy by hardware and software models. These models have been built in order to illustrate how black hole works and how the strategy can detect and block the black hole practically in AODV based MANET. This paper presents the method in an integrated manner. In this method, the detection process starts from the previous node, not from the source node. However, this method can choose the shortest path and can deal with more than one black hole. These additions will preserve the performance of network, the hardware model has been provided with liquid crystal displays LCD put on each node. LCD is used to appear each step, and to make the system full-acknowledgment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
本地入侵检测策略的软硬件实现
移动自组织网络(MANET)存在许多不良挑战,黑洞(BH)是MANET中最重要的挑战之一。许多研究人员提出了依靠不同策略来应对这一挑战的研究。问题是这些策略有多大的能力来检测和阻止BH以清空网络中的威胁,以及这些解决方案在实际中可以实现多少来处理威胁。然而,所需要的策略也应该在保持网络性能的同时。本研究的思想已应用于基于AODV的MANET,该策略通过使用不在地址范围内的虚拟地址的欺骗性消息来处理合作黑洞[1]。本文的主要兴趣除了提出新的思想外,还在于通过提供必要的细节将这一思想转化为战略,并通过硬件和软件模型实现战略。这些模型的建立是为了说明黑洞是如何工作的,以及该策略如何在基于AODV的MANET中实际地探测和阻止黑洞。本文综合介绍了该方法。在这种方法中,检测过程从前一个节点开始,而不是从源节点开始。然而,该方法可以选择最短路径,并且可以处理多个黑洞。这些增加将保持网络的性能,硬件模型已提供液晶显示器放在每个节点上。采用液晶显示器显示各步骤,并使系统充分确认。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Enhanced Real-Time Shadow Rendering Technique in Outdoor Augmented Reality Enhanced Security of the Internet of Medical Things (IOMT) A Hybrid Approach for Automatic Morphological Diacritization of Arabic Text Improving DNA Computing through CRISPR based Model and Visual DNA Tool A new strategy for mobility prediction in the PCS network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1