A Survey on Data Intrusion schemes used in MANET

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 02 | Feb -2017

p-ISSN: 2395-0072

www.irjet.net

A Survey on Data Intrusion schemes used in MANET Basappa Birajdar1, A. N. Pimpale2, Nilima Nikam3 1

M. E Student, Dept. of CE ,YTIET, Karjat , Maharashtra, India 2

3

Lecturer, Dept. of ExTc ,YTP, Karjat, Maharashtra, India

Nilima Nikam,HOD, Dept. of CE,YTIET, Karjat, Maharashtra, India

---------------------------------------------------------------------***--------------------------------------------------------------------node having IDS detect local intrusion & co-operate with neighbor node. Absence of centralized node because of flexibility in their architecture. MANET networks makes this scheme traffic concentrated [3]. found correlated applications with WSN. Due to dynamic Routing Protocol Analyzer (RPA) & distributed architecture of MANET, it had gone through many problems in Intrusion Detection Engine (DIDE) has implemented to data intrusion. This paper reviews some problem definitions in observe local aggregate traffic considering local data intrusion of MANET. Also reviewed some proposed mobility. solutions in problem definitions of data intrusion. Proposed

Abstract - Mobile Ad hoc networks gained popularity

method introduces RWD for efficient detection eliminating detection engines in WSN.

1.2 Cooperative IDS using Cross-Feature Analysis in MANETs

Key Words: MANET, RWD, Intrusion Detection Schemes

This scheme based on data mining technique. It automatically constructs an anomaly detection model. Model uses cross feature analysis & define rules to detect attacks or attackers. Every node analyzed & compared with its predicted values. Average of node count or its probabilities calculated for anomalies [4]. Different algorithms such as C4.5, Ripper, and NBC were instigated to calculate PDF. Cluster based IDS architecture proposed for cluster heads. Equal service time assigned to all cluster heads. Statistic based analysis is also one of the solution.

( IDS).

1. INTRODUCTION Due to use of wireless sensors, mobile ad hoc networks are more susceptible to attacks. Security in data is one of the prime issues. Intrusions are actions to compromise integrity, confidentiality with available resources [1]. Intrusion detection systems are mainly classified in terms of their data collection, detection & response. Basically three techniques had adapted in literature for data intrusion. 1) Anomaly-based intrusion detection 2) Misuse-based intrusion detection 3) Specification based intrusion detection

1.3 Zone-Based Intrusion Detection System

MANET networks are characterized by some of the problematic characteristics such as lack of central point, mobility in wireless network, bandwidth requirement, line of sight problem, & limited resources [2]. Nevertheless, it is very difficult to design a once-for-all detection model. Some proposed intrusion detection schemes to overcome these problems are discussed below.

1.1 Distributed and Cooperative IDS This was the first IDS proposed by Zhang & Lee. This intrusion detection mechanism is based on reliable exchange of network events and active cooperation between the participating nodes. In this scheme every Š 2017, IRJET

|

Impact Factor value: 5.181

|

Fig. 1 Zone based IDS ISO 9001:2008 Certified Journal

|

Page 709


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
A Survey on Data Intrusion schemes used in MANET by IRJET Journal - Issuu