Mitigating Selective Blackhole Attacker By Using Divergence Metric Based Advanced Intrusion Detection System
| International Journal of Computer Trends and Technology (IJCTT) | |
© - October Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-10 | ||
Year of Publication : 2013 | ||
Authors :H.Shaleena , A.Prakash |
H.Shaleena , A.Prakash"Mitigating Selective Blackhole Attacker By Using Divergence Metric Based Advanced Intrusion Detection System"International Journal of Computer Trends and Technology (IJCTT),V4(10):3679-3684 October Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- A mobile adhoc network is a group of mobile nodes that does not have the permanent infrastructure. Providing a route from source to destination is a primary problem in MANET because of the random movement of the nodes. An adversary node generates a Blackhole attack and acquire the route from source to destination. We suggest Intrusion detection system which executes Anti-black hole mechanism for detecting the black hole attack. This mechanism calculates the suspicious value of the nodes based on the irregular dissimilarity between the routing messages transmitted from the node. When there is an increase in suspicious value than the threshold value, an intrusion detection system will transmit a block message, inform to all nodes on the network. This intrusion detection system is only identifies the black hole attacks when they occur constantly. But in this system it does not perceive when the node behaves an attacker occasionally. So in order to conquer this trouble, we provide an innovative approach called advanced intrusion detection method which is identifying the selective black hole attack even it is abnormally behaving rarely. This can be accomplished by including the computation divergence of every node behavior. The divergence distribution precisely discover out even very small divergence of normal behavior. In the advanced intrusion detection method we utilize kulback liebler divergence to compute the divergence in node’s behavior.
References -
[1] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto, “Detecting Blackhole attack on AODV-based Mobile Ad Hoc Networks by dynamic learning method”, International Journal of Network Security 5 (3) (2007) 338–346.
[2] LathaTamilselvan, Dr.V. Sankaranarayanan, “Prevention of co-operative blackhole attack in MANET”, Journal of Networks 3 (5) (2008) 13–20.
[3] T. Clausen, P. Jacquet, “Optimized Link State Routing Protocol (OLSR)”, IETF RFC 3626, October 2003.
[4] KimayaSanzgiri, Daniel LaFlamme, Bridget Dahill, Brian Neil Levine, ClayShields, Elizabeth M. Belding-Royer, “Authenticated routing for Ad hocnetworks”, IEEE Journal on Selected Areas in Communications 23 (3) (2005)598–610.
[5] Charles E. Perkins, PravinBhagwat, “Highly dynamic destination-sequenceddistance-vector routing (DSDV) for mobile computers”, SIGCOMM (1994).
[6] Manel G. Zapata, N. Asokan, ‘‘Securing Ad-hoc Routing Protocols”, in: Proc. of the ACM Workshop on Wireless Security (WiSe), 2002.
[7] Yih-Chun Hu, Adrian Perrig, David B. Johnson, ‘‘Ariadne: A Secure On-DemandRouting Protocol for Ad Hoc Networks”, in: Proc. of the ACM Conference on Mobile Computing and Networking (MobiCom), pp. 12–23, 2002.
[8] SemihDokurer, Y.M. Erten, Can ErkinAcar, ‘‘Performance Analysis of Ad-hocNetworks under Black Hole Attacks”, in: Proc. of the IEEE SoutheastCon, pp.148–153, 2007.
[9] JunhaiLuo, Mingyu Fan, Danxia Ye, ‘‘Black Hole Attack Prevention Based onAuthentication Mechanism”, in: Proc. of the IEEE Singapore International Conference on Communication Systems (ICCS), pp. 173–177, 2008.
[10] R.A. Raja Mahmood, A.I. Khan, ‘‘A Survey on Detecting Black Hole Attack inAODV-based Mobile Ad Hoc Networks”, in: Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), pp. 1–6, 2007.
Keywords :— MANETs, Selective black hole attack, Intrusion detection system (IDS), Kulback liebler divergence