Title :
Efficient anomaly intrusion detection system in adhoc networks by mobile agents
Author :
Esfandi, Abolfazl
Author_Institution :
Boroujerd Branch, Dept. of Comput. Eng., Islamic Azad Univ., Boroujerd, Iran
Abstract :
Networks are protected using many firewalls and encryption software´s. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like denial of service or hack the information. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. This paper incorporates agents and data mining techniques to prevent anomaly intrusion in mobile adhoc networks. Innuendo, presenting an anomaly detection system comprises of detection modules for detecting anomalies in each layer. Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies. The Mobile agents monitoring the neighboring nodes and collect the information from neighboring home agents to determine the correlation among the observed anomalous patterns before it will send the data. This system was able to stop all of the successful attacks in an adhoc networks and reduce the false alarm positives.
Keywords :
ad hoc networks; cryptography; data mining; mobile agents; mobile radio; telecommunication computing; telecommunication security; anomaly intrusion detection system; data mining; encryption software; firewalls; mobile ad hoc networks; mobile agents; security attacks; wireless networks; Construction industry; Cryptography; Mobile ad hoc networks; Monitoring; Training; Adhoc networks; Intrusion detection system; Mobile agents; Network Security;
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
DOI :
10.1109/ICCSIT.2010.5563804