Grin logo
de en es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - IT-Security

Intrusion Detection System in mobile ad hoc network in MAC layer

Titel: Intrusion Detection System in mobile ad hoc network in MAC layer

Masterarbeit , 2013 , 50 Seiten , Note: C

Autor:in: Tapan Gondaliya (Autor:in)

Informatik - IT-Security
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

The rapid proliferation of Mobile ad hoc network has changed the landscape of network security. The recent DOS attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology and cooperative algorithms, lack of centralized monitoring and management point and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.
There are many intrusion detection techniques have been developed on Ad hoc network but have been turned to be inapplicable in this new environment. Here we need to search for new architecture and mechanisms to protect Mobile Ad hoc network. In the above all technique of intrusion detection is applied on the only one layer and that is probably on routing layer. But here we apply this intrusion detection system in the MAC layer for the more security, efficiency and high speed compare to other technique those whose apply in the network layer.

Leseprobe


Table of Contents

Chapter 1. Introduction

1.1 Mobile Adhoc Network

1.1.1 History of Mobile Adhoc Networks

1.1.2 Overview Of Mobile Adhoc Networks

1.1.3 Adhoc Routing Protocols for MANET

1.1.3.1 Table Driven Protocols

Destination-Sequenced Distance-Vector Routing (DSDV)

Cluster head Gateway Switch Routing (CGSR)

Wireless Routing Protocol (WRP)

1.1.3.2 On demand Protocols

Ad-Hoc On-Demand Distance Vector Routing (AODV)

Dynamic Source Routing (DSR)

1.1.3.3 Hybrid Protocols

Zone Routing Protocol

1.2 Overview of intrusion detection

1.3 Intrusion Detection System

1.3.1 Host based intrusion detection system

1.3.2 Network based intrusion detection system

1.4 Why we need IDS

1.5 IDS Techniques

1.5.1 Anomaly Detection

1.5.2 Misuse Detection or Signature Detection

1.5.3 Target Monitoring

1.5.4 Stealth Probes

1.6 Overview of wormhole attacks

Chapter 2. Review of literature

Chapter 3. Present work

3.1 Scope of Study

3.2 Problem Formulation

3.3 Objective

Chapter 4. Research Methodology

Chapter 5. Result and Discussion

Chapter 6. Conclusion and Future works

Chapter 7. References

Research Objectives and Focus

The primary research objective is to develop a more efficient and secure Intrusion Detection System (IDS) for Mobile Ad Hoc Networks (MANETs) by shifting the detection mechanism from the network/routing layer to the Media Access Control (MAC) layer to enhance detection speed and reliability against complex threats like wormhole attacks.

  • Analysis of MANET security vulnerabilities and current routing protocol limitations.
  • Implementation of a MAC-layer IDS to identify and isolate malicious activities.
  • Investigation of wormhole attack scenarios and their impact on network performance.
  • Utilization of simulation tools (NS-2) to model node behavior and evaluate IDS effectiveness.

Excerpt from the Book

1.6 Overview of wormhole Attacks

Wormhole Attack in Manet is one of the effective attacks on routing protocols in which two or more malicious nodes receive packets at one point of the network and transmit them to another location by a wired or wireless tunnel. This attack is very powerful and that the detection of it is very difficult work. This attack is a one kind of a serious threat in wireless networks, especially against many wireless ad-hoc networks and location-based wireless security systems. There is several wormhole detection and Prevention methods in the wireless ad-hoc networks some of them are described in this article [25].

Summary of Chapters

Chapter 1. Introduction: This chapter provides an foundational overview of Mobile Ad Hoc Networks (MANETs), their routing protocols, and the critical need for robust Intrusion Detection Systems (IDS) to counter sophisticated threats like wormhole attacks.

Chapter 2. Review of literature: This chapter surveys existing research on intrusion detection models, highlighting the evolution of security mechanisms and identifying gaps in previous methodologies regarding MANET vulnerability protection.

Chapter 3. Present work: This chapter outlines the research scope, defines the specific problem formulation regarding security at the MAC layer, and sets the research objectives for the proposed IDS.

Chapter 4. Research Methodology: This chapter details the simulation environment (NS-2) and the tools used to model the ad hoc network and test the proposed intrusion detection strategy.

Chapter 5. Result and Discussion: This chapter presents the experimental findings, providing step-by-step screenshots and analyses of the IDS detecting wormhole attacks in a simulated MAC layer environment.

Chapter 6. Conclusion and Future works: This chapter summarizes the research achievements regarding MAC-layer intrusion detection and outlines potential directions for future work to address a broader range of network attacks.

Chapter 7. References: This chapter lists the scholarly articles, books, and resources cited throughout the dissertation.

Keywords

Mobile Ad Hoc Networks, MANET, Intrusion Detection System, IDS, MAC Layer, Wormhole Attack, Network Security, Routing Protocols, NS-2, Simulation, Anomaly Detection, Signature Detection, Denial of Service, Wireless Security, Packet Dropping

Frequently Asked Questions

What is the core focus of this dissertation?

The dissertation focuses on improving network security in Mobile Ad Hoc Networks (MANETs) by implementing an Intrusion Detection System (IDS) specifically at the Media Access Control (MAC) layer rather than the traditional routing layer.

What are the primary security threats addressed?

The work primarily addresses serious network threats, with a specific focus on wormhole attacks, where malicious nodes create unauthorized tunnels to disrupt or intercept data traffic.

What is the main objective of this study?

The main objective is to achieve earlier and more efficient detection of malicious activities and viruses to reduce network workload and improve the overall security posture of MANETs.

Which scientific methodology is utilized?

The author utilizes a simulation-based methodology, specifically employing the Network Simulator-2 (NS-2) software on an Ubuntu Linux environment, to model network behavior and validate the proposed IDS.

What topics are covered in the main section?

The main section covers an analysis of various MANET routing protocols (Table-driven, On-demand, Hybrid), the theoretical framework of IDS techniques, and the practical implementation and evaluation of a MAC-layer intrusion detector.

Which keywords best describe this research?

The research is best characterized by terms such as MANET, MAC layer, Intrusion Detection System, wormhole attack, NS-2 simulation, and network security.

Why is the MAC layer preferred for IDS implementation in this study?

The author argues that applying IDS at the MAC layer allows for earlier detection of attacks and viruses compared to routing-layer implementations, thereby optimizing performance and response time.

How does the author evaluate the effectiveness of the proposed IDS?

Effectiveness is evaluated by running simulations in NS-2 that generate 10 active mobile nodes, introducing wormhole attack scenarios, and capturing visual snapshots to confirm that the IDS automatically detects and triggers responses to these attacks.

Ende der Leseprobe aus 50 Seiten  - nach oben

Details

Titel
Intrusion Detection System in mobile ad hoc network in MAC layer
Hochschule
Lovely Professional University, Punjab  (School Of Computer Science and Engineering)
Veranstaltung
M.Tech(CSE)
Note
C
Autor
Tapan Gondaliya (Autor:in)
Erscheinungsjahr
2013
Seiten
50
Katalognummer
V276616
ISBN (eBook)
9783656697626
ISBN (Buch)
9783656699538
Sprache
Englisch
Schlagworte
intrusion detection system Intrusion Detection System in mobile ad hoc network in MAC layer
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Tapan Gondaliya (Autor:in), 2013, Intrusion Detection System in mobile ad hoc network in MAC layer, München, GRIN Verlag, https://www.grin.com/document/276616
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  50  Seiten
Grin logo
  • Grin.com
  • Versand
  • Kontakt
  • Datenschutz
  • AGB
  • Impressum