DOI QR코드

DOI QR Code

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R. (Dept of Computer Science and Engineering, Sastra University) ;
  • Umamakeswari, A. (Dept of Computer Science and Engineering, Sastra University)
  • 투고 : 2017.12.05
  • 심사 : 2018.05.06
  • 발행 : 2018.09.01

초록

Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

키워드

참고문헌

  1. Su Ming-Ying et al, "Prevention of Selective Balckhole Attacks on MANETs through intrusion detection systems," Computer Communications (ELSEVIER), The Netherlands, pp. 107-117, 2011.
  2. Snehal, P. Dongarea; Mangrulkarb, R. S, "Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks," Procedia Computer Science, 78 (2016), pp. 423-430, 2015. https://doi.org/10.1016/j.procs.2016.02.084
  3. Xiang Wang, Xiaodong Song, "New Clustering Routing Method Based on PECE for WSN. EURASIP Journal on Wireless Communications and Networking," (162), pp. 1-13, DOI: 10.1186/s13638-015-0399-x, 2015.
  4. Si Liu, Ting Zhang, "Novel Unequal Clustering Routing Protocol Considering Energy Balancing Based on Network Partition & Distance for Mobile Education," Journal of Network and Computer Applications, vol. 88, no. 15, pp. 1-9. m2017, DOI:10.1016/j.jnca.2017.03.025
  5. Niu H L, Liu S, "Novel PEECR-based Clustering Routing Approach," Soft Computing, vol. 21, no. 24, pp. 7313-7323, DOI: 10.1007/s00500-016-2270-3, 2017.
  6. Zhongda Tian, Shujiang Li, Yanhong Wang, Quan Zhang, "Multi permanent rmagnet synchronous motor synchronization control based on variable universe fuzzy PI method," Engineering Letters, vol. 23, no. 3, pp. 180-188, 2015.
  7. Zhongda Tian ,Shujiang Li, Yanhong Wang, "T-S fuzzy neural network predictive control for burning zone temperature in rotary kiln with improved hierarchical genetic algorithm," Int Journal of Modeling, Identification and Control, vol. 25, no. 4, pp. 323-334, 2016.
  8. Zhongda Tian, Xianwen Gao, Dehua Wang, "The Application Research of Fuzzy Control with Self-tuning of Scaling Factor in the Energy Saving Control System of Pumping Uni," Engineering Letters, vol. 24, no. 2, pp. 187-194, 2016.
  9. Zhongda Tian, "Main steam temperature control based on GA-BP optimized fuzzy neural network," Inter-national Journal of Engineering Systems Modelling and Simulation, vol. 9, no. 3, pp. 150-160, 2017. https://doi.org/10.1504/IJESMS.2017.085057
  10. Yanping Liang, "A kind of novel method of service-aware computing for uncertain mobile applications," Mathematical and Computer Modelling, vol. 57, no. 3-4, pp. 344-356, 2013. https://doi.org/10.1016/j.mcm.2012.06.012
  11. Degan Zhang., "A new approach and system for attentive mobile learning based on seamless migration," Applied Intelligence, vol. 36, no. 1, pp. 75-89, 2012. https://doi.org/10.1007/s10489-010-0245-0
  12. Zhou S, Ya-meng Tang, "A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy," Mobile Networks & Applications, 2. DOI: 10.1007/s11036-017-0878-x, 2017.
  13. Xiaodan Zhang, "Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application," Enterprise Information Systems, vol. 6, no. 4, pp. 473-489, 2012. https://doi.org/10.1080/17517575.2011.626872
  14. Juntao Gao, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori, "End-to-End Delay Modeling for Mobile Ad Hoc Networks. A Quasi-Birth-and-Death Approach," Ad Hoc & Sensor Wireless Networks, 2015.
  15. X J Kang, "A novel image de-noising method based on spherical coordinates system," EURASIP Journal on Advances in Signal Processing, 2012(110):1-10. DOI:10.1186/1687-6180-2012-110, 2012.
  16. Xiaodong Song, Xiang Wang. "New Agent-based Proactive Migration Method and System for Big Data Environment(BDE)," Engineering Computations, vol. 32, no. 8, pp. 2443-2466, 2015. https://doi.org/10.1108/EC-03-2015-0050
  17. Xiang Wang, Xiaodong Song. "New Medical Image Fusion Approach with Coding Based on SCD in Wireless Sensor Network," Journal of Electrical Engineering & Technology, vol. 10, no. 6, pp. 2384-2392, 2015. https://doi.org/10.5370/JEET.2015.10.6.2384
  18. Zhao C P, "A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network," Computers & Electrical Engineering, vol. 38, no. 3, pp. 694-702, 2012. https://doi.org/10.1016/j.compeleceng.2012.02.016
  19. Li W B, "Novel Fusion Computing Method for Bio-Medical Image of WSN Based on Spherical Coordinate," Journal of Vibro Engineering, vol. 18, no. 1, pp. 522-538, 2016.
  20. Degan Zhang, Xiang Wang, Xiaodong Song, "A Novel Approach to Mapped Correlation of ID for RFID Anti-collision," IEEE Transactions on Services Computing, vol. 7, no. 4, pp. 741-748, 2014. https://doi.org/10.1109/TSC.2014.2370642
  21. Ma Z, "A Novel Compressive Sensing Method Based on SVD Sparse Random Measurement Matrix in WSN," Engineering Computations, vol. 33, no. 8, pp. 2448-2462, 2016. https://doi.org/10.1108/EC-09-2015-0269
  22. Yanan Zhu, "A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IOT)," Computers & Mathematics with Applications, vol. 64, no. 5, pp. 1044-1055, 2012. https://doi.org/10.1016/j.camwa.2012.03.023
  23. Ma Z, "Shadow Detection of Moving Objects Based on Multisource Information in Internet of Things," Journal of Experimental & Theoretical Artificial Intelligence, vol. 29, no. 3, pp. 649-661, 2017. https://doi.org/10.1080/0952813X.2016.1212105
  24. Marti, S, Giuli, T. J, Lai, K., Baker, M, "Mitigating routing misbehavior in mobile ad hoc networks," Mobile Computer Networks, pp. 255-265, 2000.
  25. Liu, K, Deng, J, Varshney, P. K, Balakrishnan, K, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, 2007. https://doi.org/10.1109/TMC.2007.1036
  26. Elhadi M, Shakshuki, Nan Kang; Tarek R. Sheltami, "EAACK-A Secure Intrusion-Detection, System for MANETs," IEEE Transactions on Industrial, vol. 60, no. 3, 2013.
  27. Abdulsalam Basabaa, Tarek Sheltami and Elhadi Shakshuki, "Implementation of A3ACKs intrusion detection system under various mobility speeds," 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014), Science Direct, Procedia Computer Science 32(2014) 571-578, 2014. https://doi.org/10.1016/j.procs.2014.05.462
  28. Song X D, Wang X, "Extended AODV Routing Method Based on Distributed Minimum Transmission (DMT) for WSN," International Journal of Electronics and Communications, vol. 69, no. 1, pp. 371-381, 2015. https://doi.org/10.1016/j.aeue.2014.10.009
  29. Ke Zheng, Ting Zhang, "A Novel Multicast Routing Method with Minimum Transmission for WSN of Cloud Computing Service," Soft Computing, vol. 19, no. 7, pp. 1817-1827, 2015. https://doi.org/10.1007/s00500-014-1366-x
  30. Ke Zheng, Dexin Zhao, "Novel Quick Start (QS) Method for Optimization of TCP," Wireless Networks, vol. 22, no. 1, pp. 211-222, 2016. https://doi.org/10.1007/s11276-015-0968-2
  31. Degan Zhang, Guang Li, Ke Zheng, "An energy-balanced routing method based on forward-aware factor for Wireless Sensor Network," IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 766-773, 2014. https://doi.org/10.1109/TII.2013.2250910