- Open Access
- Total Downloads : 402
- Authors : Sampath S, Dr. V. Thiagarasu
- Paper ID : IJERTV4IS070592
- Volume & Issue : Volume 04, Issue 07 (July 2015)
- DOI : http://dx.doi.org/10.17577/IJERTV4IS070592
- Published (First Online): 21-07-2015
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
An Agent based Intrusion Detection System Architecture for Mobile Ad Hoc Networks using Ant Colony Algorithm
S. Sampath
Research Scholar, Department of Computer Science,
Karpagam University, Coimbatore, Tamilnadu, India.
V. Thiagarasu
Associate Professor, Department of Computer Science,
Gobi Arts & Science College, Gobichettipalayam, Tamilnadu, India
Abstract There is a major security threat for Mobile Ad Hoc Networks (MANETs) because of its de-centralized dynamic nature The dynamic nature of MANETs forces a set of challenges to its effective implementation such as intrusion detection procedures which provides secured performance in MANET applications. In this paper, an agent based intrusion detection and prevention system has been designed using ant colony algorithm. Each node is monitored using a mobile agent of the MANET and each node runs a specific application. Multi- depot packet routing (MDPR) in Ant colony optimization is used to analyze the packets from multiple nodes join in MANET. Support vector machines (SVM) is used to identify the malicious activities of current packet with pre-recorded activities.
Keywords Ad Hoc Network, MANET, IDS, MDPR, Mobile Agent
-
INTRODUCTION
A MANET is a type of ad hoc network that has no fixed infrastructure, can change locations and configure itself on the fly. Security is one of the major challenge to the applications on a MANET. An Intrusion Detection System (IDS) is a process of detecting and isolating to malicious activity located at computing and networking devices. A number of Intrusion Detection System architectures have been already developed. In this paper, an agent based IDS architecture using ant colony optimization for MANET has been introduced. This architecture, each node in the network implements a small piece of software called Mobile Agent that cares IDS detection and associated activities till the MANET vanish. Section 2 of this study compares with almost all existing techniques. The architecture has been implemented with the network simulator tool NS-2 and can also be implemented with Qualnet or Snort. Section 3 of this paper deals with the proposed detection technique. Section 4 explains the concept in Simulated environment. Results and findings are presented in Section 5. Section 6 Concludes.
-
RELATED WORK
Intrusion detection systems are implemented using software agents named mobile agents which is capable to flow from one node to another. These agents are used to identify any
attacks from malicious nodes. There are different types of attacks13 as below:
-
Passive Attacks: Without affecting the routing protocols the information about the node and network is collected. Two types of passive attacks13 are 1. Eavesdropping: The wireless messages are inter-received without the knowledge of sender or receiver. Cryptographic messages can be used to safeguard from this type of attacks. 2. Traffic Analysis: Based on heave communications to important hosts, it is easily identified the importance of the specific host than others and hence targeted.
-
Active Attacks: There are four types of active attacks7 i) Sleep Deprivation: One computing or network device communicates with another node and the attacker keeps the resources busy. ii) Black Hole: In this case, a malicious host in the middle drops malwares instead of packet transmission.
-
Grey Hole: The malwares are dropped to particularly selected host. iv) Sybil: with alternate congruence the attacker may forward packets may produce mayhem to block or disturb routing.
Fig.1: Types of attacks in MANET
-
-
PROPOSED IDS ARCHITECTURE
The proposed architecture is depicted in Fig. 2. Through self-organized collaboration these ID agents form a distributed intrusion detection system (DIDS). The sensor layer of an ID agent provides the interface to the network and the host on which the agent resides. Sensors acquire raw data from both the network and the host, filter incoming data, and extract interesting and potentially valuable (e.g., statistical) information which is needed to construct an appropriate event. At the detection layer, different detectors, e.g., classifiers trained with machine learning techniques such as support vector machines (SVM) or conventional rule-based systems such as Snort, assess these events and search for known attack signatures (misuse detection) and suspicious behavior (anomaly detection). In case of attack suspicion, they create alerts which are then forwarded to the alert processing layer. Alerts may also be produced by firewalls (FW) or the like. At the alert processing layer, the alert aggregation module has to combine alerts that are assumed to belong to a specific attack instance. Thus, so-called meta-alerts are generated. Meta- alerts are used or enhanced in various ways, e.g., scenario detection or decentralized alert correlation. An important task of the reaction layer is reporting.
Intrusion Prevention and Reporting
Isolation and protection (Processing layer-II)
Intimation
Alert aggregation using ant colony optimization (Processing layer-I)
Misuse and anomaly detection using SVM (Detection layer)
Autonomous local agents monitoring & alerting system (Monitoring layer)
Fig.2:Architecture of proposed IDS
-
Monitoring layer: The individual multiple agents located on each host monitors for any malicious or anomaly or deviation from normal activities. If any misbehavior, the details will be intimated to detection layer. Whenever a node wants to transfer information to another node, it broadcasts the message to its neighboring nodes. The agent also gathers neighboring nodes information. It then calls the SVM classifier to find out the attacks with the help of trained test data.
-
Detection Layer: SVM classifier compares the data submitted by local agents with trained test data and alerts the attack if any.
-
Processing layer-1: The alerts made by the detection layer are aggregated using ant colony optimization. The pseudo code is
procedure Alert_Heuristic while(not_termination)
generateSolutions() daemonActions() Updatedatabase()
end while end procedure
-
Processing layer-2: The identified node is isolated and prevented from further attack. The message is communicated to all the remaining nodes to avoid communication and asked to update the local agents database about the attack.
-
Intrusion prevention: The characteristics of new attack is identified and analyzed for prevention of such attacks in future. Proper report also created for further reference.
IV SIMULATIONS AND FUTURE WORK
The proposed system is verified using the network simulator software NS-2 networking simulator. The simulated environment is as follows:
TABLE I. SIMULATED ENVIRONMENT
Property
Value
Network shape
500 meter X 500 meter
Radio Range of each node
160-220 meters
Node Selection
Random
Base Station Moment
Random
Topological Model
Multi hop hierarchical
Speed of each node
5 meters/second
Transmission Capacity
2 Mbps
Total flows
20-30
Set node count
50
Average transmission per
flow
3 packets per second
Testing execution time
1 minute
V RESULT AND FINDINGS
The result shows the following findings:
-
When number of nodes increases, the effectiveness of local agents decreases (Chart-1). Until number of nodes reaches 40, 100% detection accuracy found. When nodes count reaches 50, only 80% of malicious nodes were detected.
6
4
2
0
Chart-1: Local agent
captured nodes
-
The time duration is not increased proportionally in same ratio with increase the node count (Chart-2). The analysis duration for 20 nodes is not doubled the duration for 10 nodes.
-
S.No |
No of Nodes |
Malicious Nodes |
Local agent captured nodes |
Duration (m/s) |
1. |
10 |
1 |
1 |
271 |
2. |
20 |
3 |
3 |
453 |
3. |
30 |
4 |
4 |
976 |
4. |
40 |
2 |
2 |
1105 |
5. |
50 |
6 |
5 |
1343 |
Chart-2:NODES vs
2000
DURATION
Fig.3:NS2 Screenshot-finding destination
VI CONCLUSION
No of malicious nodes
Design of an IDS with localized agents with monitoring and preventive control for both hosts and the whole network faces many challenges. Disentangled design with high accuracy are the main factors in IDS design. This research work initiated an agent based IDS which satisfies the above mentioned criteria. This work can be further developed in future for android mobile and direct wifi devices.
REFERENCES
-
Dokurer, S. Ert, Y.M. ; Acar, C.E. Performance analysis of ad-hoc networks under black hole attacks, Proceedings. IEEE. pp. 148 153, 2007
Local
agent captured nodes
-
Deng, H., Li, W., Agrawal, D., "Routing Security in Wireless Ad Hoc Networks" IEEE Communication Magazine ( October 2002) pp. 70-75
-
Al-Shurman, M., Yoo, S., Park, S., "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference (2004) pp. 96- 97
10 20 30 40
NodeCount
-
Mishra, A., Nadkarni, K., Patcha, A., "Intrusion detection in wireless ad-hoc networks", IEEE Wireless Communications, February 2004, pp. 48-60.
-
Abdelgadir, A.T., M. Ahmed, A.S.K. Pathan, M.A. Abdullah and S. Haseeb, 2011. Performance analysis of a highly available home agent in mobile networks. Am. J. Applied Sci., 8: 1388-1397.
DOI:10.3844/ajassp.2011.1388.1397
Duration (m/s)
-
Bose, S., S. Bharathimurugan and A. Kannan, 2007.Multi-layer integrated anomaly intrusion detection system for mobile adhoc networks. Proceedings of the International Conference on Signal Processing, Communications and Networking, Feb. 22-24, IEEE Xplore Press, Chennai, pp: 360-365.
DOI:10.1109/ICSCN.2007.350763
10 20 30 40
NodeCount
Duration
(m/s)
1000
0
-
Chuan-Xiang, M. and F. Ze-Ming, 2009. A novel intrusion detection architecture based on adaptive selection event triggering for mobile ad- hoc networks. Proceedings of the 2nd International Symposium on Intelligent Information Technology and Security Informatics, Jan. 23- 25, IEEE Xplore Press, Moscow, pp: 198-201.
DOI:10.1109/IITSI.2009.54
-
Farhan, A.F., D. Zulkhairi and M.T. Hatim, 2008.Mobile agent intrusion detection system for Mobile Ad Hoc Networks: A non- overlapping zone approach. Proceedings of the 4th IEEE/IFIP International Conference on Internet, Sept. 23-25, IEEE Xplore Press,
Tashkent, pp: 1-5. DOI: 10.1109/CANET.2008.4655310
-
Jacoby, G.A. and N.J. Davis, 2007. Mobile host-based intrusion detection and attack identification. IEEE Wireless Commun., 14: 53- 60. DOI: 10.1109/MWC.2007.4300984
-
Jha, S., K. Tan and R. Maxion, 2001. Markov chains, classifiers and intrusion detection. Proceedings of the 14th IEEE Computer Security Foundations Workshop, Jun. 11-13, IEEE Xplore Press, pp: 206-219. DOI:10.1109/CSFW.2001.930147
-
Kominos, N. and C. Douligeris, 2009. LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7: 171- 182. DOI: 10.1016/j.adhoc.2008.01.001
-
Lauf, A., R.A. Peters and W.H. Robinson, 2010. A distributed intrusion detection system for resource constrained devices in ad-hoc networks. Elsevier J. Ad Hoc Network., 8: 253-266.
DOI:10.1016/j.adhoc.2009.08.002
-
Ms Priyanka P Kulkarni, 2015, A Survey on Secure Intrusion Detection System for MANET, International Journal of Advanced Research in Computer Science and Software Engineering, 5:3-4.
-
Vishnu Balan E, Priyan M K, Gokulnath C, Prof.Usha Devi G, 2015, Fuzzy Based Intrusion Detection Systems in MANET, 2nd International Symposium on Big Data and Cloud Computing (ISBCC15), Elsevier ScienceDirect, Procedia Computer Science 50 ( 2015 ) 109 114.
-
J. Godwin Ponsam, R. Srinivasan, 2014, Multilayer Intrusion Detection in MANET, International Journal of Computer Applications (0975 8887) 98: 20