DOI QR코드

DOI QR Code

Performance Evaluation of IDS on MANET under Grayhole Attack

그레이홀 공격이 있는 MANET에서 IDS 성능 분석

  • Kim, Young-Dong (Dept. of Electric Railway Convergence Engineering, Dongyang University)
  • 김영동 (동양대학교 철도전기융합학과)
  • Received : 2016.10.04
  • Accepted : 2016.11.24
  • Published : 2016.11.30

Abstract

IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

MANET 라우팅 기능에 혼란을 초래하여 네트워크 전송기능을 저하시키는 악성공격에 대한 대응수단으로 IDS가 사용된다. 본 논문에서는 전송패킷의 일부를 공격대상으로 하는 그레이홀 공격이 있는 MANET에서 IDS가 전송성능에 미치는 영향을 분석하고, 그레이홀 공격에 대한 효과적인 IDS 조건을 살펴본다. 성능분석은 NS-2를 기반으로 하는 컴퓨터 시뮬레이션을 사용하며, VoIP를 응용서비스로 하여 전송성능을 측정한다. 음성전송의 표준전송품질척도인 MOS, CCR, 종단간지연 등을 성능측정 및 분석 파라미터로 사용한다.

Keywords

References

  1. H. Simarenare and R. Sari, "Performance Evaluation of AODV Variants on DDoS, Blackhole and Malicious Attacks," Int. J. of Computer and Networks Security, vol. 11, no. 6, June 2011, pp. 277-287.
  2. Y. Kim, "Transmission Performance of MANET under Grayhole Attack," In Proc. of Conf. on Korea Institute of Information and Communication Engineering, 2015, Busan, Korea, vol. 19 no.1, May 2015, pp. 639-641.
  3. Y. Kim, "Transmission Performance of Voice Traffic on MANET under Grayhole Attack," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 12, Dec. 2015, pp. 1411-1416. https://doi.org/10.13067/JKIECS.2015.10.12.1411
  4. G. Neekhra, S. Patel, A. Verma, and A. Chaurasia, "Effect Of Grayhole Attack With Ids Technique For Aodv Routing Protocol Using Network Simulator," Int. J. of Advanced Research in Computer Engineering & Technology, vol 3, issue 12, Dec. 2014, pp. 4184-4190.
  5. J. Kaur and V. Kumar, "An Effectual Defense Method against Gray Hole Attack in Wireless Sensor Networks," Int. J. of Computer Science and Information Technologies, vol. 3, no. 3, 2012, pp. 4523-4528.
  6. Y. Kim, "Transmission Performance of Application Service Traffic on MANET with IDS," In Proc. of Conf. on Korea Institute of Information and Communication Engineering 2012, Istanbul, Turkey, vol. 16 no. 1, May 2012, pp. 584-587.
  7. A. Bacioccola, C. Cicconetti, and G. Stea, "User - level Performance Evaluation of VoIP using NS-2," In Proc. of 2nd Int. Conf. on Performance Evaluation Methodologies and Tools, Nantes, France, Oct. 2007.
  8. D. Choi, "Evaluation of VoIP Service Quality under the Roaming of Mobile Terminals," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, Aug. 2012, pp. 747-752.
  9. D. Choi, "Evaluation of VoIP Capacity for IEEE 802.11b WiFi Environment under Voice Coding Methods," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, Apr. 2012, pp. 243-248.
  10. B. Kim, "Software-based Quality Measurement of Mobile VoIP Services," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 1, Jan. 2011, pp. 55-60.