Intrusion detection system on MAC layer for attack prevention in MANET

Tapan P. Gondaliya, M. Singh
{"title":"Intrusion detection system on MAC layer for attack prevention in MANET","authors":"Tapan P. Gondaliya, M. Singh","doi":"10.1109/ICCCNT.2013.6726538","DOIUrl":null,"url":null,"abstract":"Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2013.6726538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于MAC层的城域网入侵检测系统
现代通信包含不同类型的无线网络作为骨干,用于不同用户的各种应用。移动自组织网络是一种包含许多移动设备的网络类型,为军事、工业和偏远地区(洪水灾区、核灾区等)的不同应用提供了多种类型的通信解决方案。事实证明,移动自组织网络最适合各种应用,如军事行动、受洪水影响的地区、偏远地区等。与其他类型的网络相比,Ad-hoc网络的能量有限,通常更容易受到各种攻击。内部攻击是Ad-hoc网络中较为活跃的攻击方式之一。这些攻击在响应式协议(如Ad-hoc随需应变距离矢量协议)中非常常见。在本研究中,我们将开发一个入侵检测系统来检测和隔离攻击。在本研究中,mac层应用程序将用于检测恶意活动,并将重点放在发现网络中的攻击序列上。本研究提出了一种基于MAC层的入侵检测系统,该系统能够检测到MANET网络中的攻击序列。研究为移动自组网设备提供了稳定有效的攻击观察结果,可直接应用于实际环境
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
“Multi-tenant SaaS cloud” Reduced order linear functional observers for large scale linear discrete-time control systems Multi pattern matching technique on fragmented and out-of-order packet streams for intrusion detection system Detection and tracking of moving objects by fuzzy textures Evacuation map generation using maze routing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1