17-01-2013, 10:08 AM
AGENT BASED EFFICIENT ANOMALY INTRUSION DETECTION SYSTEM IN AD HOC NETWORKS
AGENT BASED EFFICIENT.pptx (Size: 240.81 KB / Downloads: 26)
ABSTRACT
Networks are protected using many firewalls and encryption software’s. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like denial of service or hack the information. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. This paper incorporates agents and data mining techniques to prevent anomaly intrusion in mobile adhoc networks. Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies. The Mobile agents monitoring the neighboring nodes and collect the information from neighboring home agents to determine the correlation among the observed anomalous patterns before it will send the data. This system was able to stop all of the successful attacks in an adhoc networks and reduce the false alarm positives.
EXISTING SYSTEM
Existing methods of intrusion detection have to be modified and new methods have to be defined in order for intrusion detection to work effectively in this new network architecture.
we will first provide an introduction to wireless ad-hoc networks and thereafter an introduction to intrusion detection.
We will then present various existing intrusion detection techniques that can be adapted to wireless ad-hoc networks and finally propose a hybrid intrusion detection system for wireless ad-hoc networks.
Wireless ad-hoc networks are increasingly being used in the tactical battlefield, emergency search and rescue missions, as well as civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks.
As wireless ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks may no longer be sufficient and effective when adapted directly to a wireless ad-hoc network.
PROPOSED SYSTEM
We proposed intrusion detection community has been deals mainly on wired networks, but it is lack of security in wireless networks.
Anomaly detection and misuse detection or signature detection are the two techniques used for intrusion detection system.
Anomaly detection describes the abnormal patterns of behavior, where "abnormal" patterns are defined beforehand.
Misuse detection relies on the use of specifically known patterns of unauthorized behavior.
Thus these techniques rely on sniffing packets and using the sniffed packets for analysis.
In order to realize these ID techniques the packets can be sniffed on each of the end hosts.
CONCLUSION
In this work, an anomaly detection system comprises of detection modules for detecting anomalies in each layer. This system is cooperative and distributive; it considers the anomaly detection result from the neighbor node(s) and sends the current working node's result to its neighbor node(s). Experimental results show that detection rate is increased when compared to the other mechanism. False positive rate is also reduced in this mechanism. Traditional security mechanism such as IDS and firewall have not been sufficient to provide the security of wireless networks, however, this mechanism is able to block abnormal approach to wireless networks and to detect previously unknown attacks as well as variations of known attacks.