MCBHIDS:改进的基于分层聚类的黑洞IDS算法

D. Roy, R. Chaki
{"title":"MCBHIDS:改进的基于分层聚类的黑洞IDS算法","authors":"D. Roy, R. Chaki","doi":"10.1109/INDCON.2013.6726110","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks are highly vulnerable to attacks due to infrastructure less environment. The features of MANETs are like open media, dynamic changes in topology, cooperative and collaborative algorithm and no centralized monitoring system. These features make the network more prone to malicious attack. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we present a new cluster based intrusion detection algorithm that takes care of black hole attacks in a MANET. This proposed algorithm is based on trustworthiness of the nodes in a network. The network is considered to be a layered structured. The nodes are member of a cluster. Each cluster has cluster head that takes care of all the members of its own cluster and communicates with cluster head at layer 2 whenever required. The cluster head at layer 2 communicate with all cluster head at layer 1. The selection of cluster head depends on three parameters battery power, mobility and trust value of a node in a cluster. Periodically the cluster head updation is done according to three parameters. We have implemented our algorithm using the NS simulator. The performance of the proposed Intrusion Detection System (IDS) has also been evaluated in the process. The performance graph shows marked improvement as far as packet dropping is concerned.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"MCBHIDS: Modified layered cluster based algorithm for black hole IDS\",\"authors\":\"D. Roy, R. Chaki\",\"doi\":\"10.1109/INDCON.2013.6726110\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile ad hoc networks are highly vulnerable to attacks due to infrastructure less environment. The features of MANETs are like open media, dynamic changes in topology, cooperative and collaborative algorithm and no centralized monitoring system. These features make the network more prone to malicious attack. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we present a new cluster based intrusion detection algorithm that takes care of black hole attacks in a MANET. This proposed algorithm is based on trustworthiness of the nodes in a network. The network is considered to be a layered structured. The nodes are member of a cluster. Each cluster has cluster head that takes care of all the members of its own cluster and communicates with cluster head at layer 2 whenever required. The cluster head at layer 2 communicate with all cluster head at layer 1. The selection of cluster head depends on three parameters battery power, mobility and trust value of a node in a cluster. Periodically the cluster head updation is done according to three parameters. We have implemented our algorithm using the NS simulator. The performance of the proposed Intrusion Detection System (IDS) has also been evaluated in the process. The performance graph shows marked improvement as far as packet dropping is concerned.\",\"PeriodicalId\":313185,\"journal\":{\"name\":\"2013 Annual IEEE India Conference (INDICON)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Annual IEEE India Conference (INDICON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDCON.2013.6726110\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Annual IEEE India Conference (INDICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCON.2013.6726110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

移动自组织网络由于基础设施较少,极易受到攻击。该网络具有媒体开放、拓扑动态变化、算法协同、无集中监控等特点。这些特点使得网络更容易受到恶意攻击。使用防火墙和加密软件保护网络的传统方式已不再足以有效地保护这些功能。在本文中,我们提出了一种新的基于聚类的入侵检测算法,该算法可以处理MANET中的黑洞攻击。该算法基于网络中节点的可信度。该网络被认为是一个分层结构。节点是集群的成员。每个集群都有一个集群头,它负责自己集群的所有成员,并在需要时在第2层与集群头通信。第2层的簇头与第1层的所有簇头通信。簇头的选择取决于集群中节点的三个参数:电池电量、移动性和信任值。根据三个参数周期性地进行簇头更新。我们使用NS模拟器实现了我们的算法。在此过程中,还对所提出的入侵检测系统的性能进行了评估。就丢包而言,性能图显示了显著的改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
MCBHIDS: Modified layered cluster based algorithm for black hole IDS
Mobile ad hoc networks are highly vulnerable to attacks due to infrastructure less environment. The features of MANETs are like open media, dynamic changes in topology, cooperative and collaborative algorithm and no centralized monitoring system. These features make the network more prone to malicious attack. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we present a new cluster based intrusion detection algorithm that takes care of black hole attacks in a MANET. This proposed algorithm is based on trustworthiness of the nodes in a network. The network is considered to be a layered structured. The nodes are member of a cluster. Each cluster has cluster head that takes care of all the members of its own cluster and communicates with cluster head at layer 2 whenever required. The cluster head at layer 2 communicate with all cluster head at layer 1. The selection of cluster head depends on three parameters battery power, mobility and trust value of a node in a cluster. Periodically the cluster head updation is done according to three parameters. We have implemented our algorithm using the NS simulator. The performance of the proposed Intrusion Detection System (IDS) has also been evaluated in the process. The performance graph shows marked improvement as far as packet dropping is concerned.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of sleep mode operation with modified non-exhaustive vacation queuing Performance analysis of next generation 3-D OFDM based optical access networks under various system impairments Hardware realization of high speed elliptic curve point multiplication using multiple Point Doublers and point adders Lifetime of a CDMA wireless sensor network with route diversity RF based train collision avoidance system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1