Search for an essay or resource:

Essay: Securing MANETs by a system of intrusion detection organizations

Essay details:

  • Subject area(s): Computer science essays
  • Reading time: 9 minutes
  • Price: Free download
  • Published: December 26, 2019*
  • File format: Text
  • Number of pages: 2
  • Securing MANETs by a system of intrusion detection organizations
    0.0 rating based on 12,345 ratings
    Overall rating: 0 out of 5 based on 0 reviews.

Text preview of this essay:

This page of the essay has 2604 words. Download the full version above.

Abstract: Communication in Mobile Ad hoc (MANETS) networks happens without specific infrastructure. This prototype assumes that an arbitrary node will forward traffic flow originating from other nodes readily. Contrariwise, in aggressive surroundings where we discover most uses of ad hoc systems, an always obliging and obedient behavior on behalf of the other nodes of the network cannot be assumed as the final act undertaken by all the nodes. The emphasis in this paper is on sensing the occurrence of malevolent nodes that selectively or casually drop packets envisioned for other target nodes. We further categorize each packet drop attack, according to its attack nature by detecting and examining how each packet drop attack affects the network characteristics. Using a simulated MANET setting and MLP-NN modelling we can exemplify an Interference Tracking System that can positively notice nasty packet dropping attacks with great correctness.

Keywords: Intrusion Detection Systems, MANET, Multi-layer Perceptron, Artificial Intelligence, Network Security, Machine Learning.

1. Introduction

Mobile Ad hoc Network (MANET) is a group of nodes which are movable and self-organize themselves into a network, with no secure topology. As such, nodes can easily wander everywhere, join or leave the network indiscriminately. MANETs can be established without any organization, henceforth are becoming very useful, especially in settings that are physically unnatural. For instance, in next generation of battleground applications intended by the military as well as in applications like catastrophe reclamation and communication interactions in liberation tasks. Also, each node can function as a router, utilizing its multi hop routing facility. This removes the necessity for a devoted router or access point for communication between nodes. However, the MANET is susceptible especially due to its unceasingly altering topology, open medium, absence of principal observing point as well as no strong distrustful mechanism. [5] For instance any untrusted node is capable of joining the network, subsequently posing dangers to it. This can be done either by dropping the packets or by providing incorrect evidence to the network among other things. Safeguarding and applying safety in MANET is of major prominence since data in transit may be intimate and distribution of packets must be safeguarded by the network. Attacks targeted at MANETs can originate either from within or outside the network and most times attacks come from reliable nodes within the network. [7]The Wireless medium is vulnerable to attacks, due to easiness of admission into the network [24]. The prices of compensations in the occasion of an attack as a result of mischievous doings in the network can have intolerable costs. Hence there is a need for systems that can monitor data movement within the network in order to avoid possible spiteful activities. Such a system for observing the network is called an Interference Tracking System (ITS)[8]. An ITS gathers and assesses data from different parts within a node or network to learn suspicious designs that may signify an attack or effort to compromise a system. [21] ITS design is based on two methods namely, Anomaly Detection and Misuse-based IDS. Misuse-based IDS looks for conduct conforming to predefined interruption or weakness signatures. [10] Anomaly detection based IDS searches for irregular network traffic, which can either be a defilement of satisfactory thresholds for a happening event or a desecration of a user’s usual behaviour in the network. [11]

2. Research Problem and Objectives
A set of n nodes framing a MANET having m nodes acting meanly by dropping packets either uninterruptedly or selectively is assumed.A section m of the nodes set up in the network is expected to be disobedient. Packets within the traffic are dropped as they are stimulated from a source to a destination. Given a path P of length k, we make a supposition that a set of m mischievous nodes, where |m|≤ k, are present on P. These nodes can be situated anywhere along P.

S- the source node is sending traffic to the destination node D along P. Node m1 is dropping all the packets it is receiving. Our goal is to classify m1, deliver confirmation of its misbehaviour, and recognize the type of attack exhibiting on m1, so that we can order it consequently for further action to diminish the attack. In this model, we reflect numerous kinds of attacks that lead to an eventual packet dropping feat, for example: Wormhole attack, Black hole attack and several others. Each attack can be perceived to disturb network features in a different way and examination of the network characteristics can give us the state of the network, telling whether it is under an attack or in standard process. [14]

In the first stage of the effort, we simulate dissimilar attacks using ns-2.35 simulator under the AODV routing protocol and in this point we amass network characteristic data that is vital for the following segment. In the following and concluding part we use the collected data of our chosen bounds for working out a neural network used for attack sorting and exposure in the Matlab platform.

3. Proposed Methodology

This investigation inspires the use of a method that hinges on Multilayer Perceptron Neural Network for recognition and classification of packet drop attacks. The recognition will be done on the collected network characteristic data. In this system we accumulate and analyse locally obtainable data. We mainly focus on nodes that contribute in the direction detection procedure effectively. The data gathering, study, detection and cataloguing mechanisms form the core of the detection procedure. Native data collected such as path demand and path fault posts, are used to extract significant constraints that affect network specific data which will be accepted as input for training the detection engine. This will in turn be used to notice and sort misbehaviour in the network. This information is collected by the data gathering module during the period of the simulation period. Composed data is conceded on to the scrutiny unit that extracts useful material or parameters from regulator messages being swapped in the network, for use as input in the second level involving training the recognition engine. The recognition engine will check for any deviance from regular behavior and sort the attacks according to their types as well. Our projected resolution has a set of two nodes namely (i) Steady nodes which do not pose any risk to the MANET. Steady nodes are accountable for switching routing data and guiding or furthering data packets to a destination on behalf of other nodes and perform actions viewed as typical in the network [14]. The second type is a (ii) Mean node with a built-in attack mechanism aimed at causing unwanted effects in the network. This node drops all data packets but returns to all routing information. This method depends on readily obtainable information at different network levels, to sense the existence of spiteful nodes.

4. Simulation and Results

Part of the work is simulated via Network Simulator (NS) 2.35. NS-2 has as its major goal to support study in networking at many institutions undertaking networking exploration [17]. New procedures can be established and movement patterns can be considered in NS-2.

The efficiency of the MLP-NN model depends on the training done as well as the data used. The gathering of data for training is a serious problem. This can be obtained by numerous methods including by using actual traffic and by using simulated traffic. In our case we use simulated traffic to arrive at our data sets, which we then divide into three subsections. The first subsection is the training set, which is used for training and appraising the ANN parameters. The second subset is the authentication set. In this phase we make use of the parameters got in phase one as the intrusion detection assessment data set .The model form of the dataset included 6000 records. A subset of the data that contained the desired attack types and a sensible amount of customary proceedings were selected physically. The last dataset used in this study involved 2500 records. MLP-NN is used to train the detection and grouping engine.

A. Training and Validation Method

This segment details an enactment of a Multilayer layer Perceptron-NN done in MATLAB using the Neural Network Toolbox [16], for the purpose of detection and ordering. We make the MLP-NN with the anticipated neurons per each coating, with a preferred activation function. The training data (feature vectors) and the equivalent objective or looked-for outputs are fed to the neural network to instigate the training. The applied neural networks had 6 input neurons (identical to the measurement of the feature vector) and output neurons equal to the quantity of classes desired. The number of inputs fed to the IDS would be precise as those defined as the MLP parameters. In the simulation of the IDS the input data types are taken into deliberation particularly the distance as well as the data range for mathematical inputs. A real test case training dataset attained from data dumps of Network Simulation from NS2 is used to train the MLP-NN. Two scenarios modelled as ordinary and combative are passed to MLP as 2 dimensional arrays in CSV file format. In order to train the MLP-NN, data is charted into the input space of the MLP-NN subsequently allowing knowledge to be led from numerical values, which is typically the circumstance.

D. Feedforward MLP-NN

An MLP-NN of a feedforward type that comprises of layers of nodes resembling a directed graph, having interconnection between the layers is used. It has a single input layer, a single unseen layer, and a single output layer. An activation function is related to every node in the concealed and output layers. Signs coming from the previous stratums are continuously fed to the subsequent layer in the frontward direction for further computations. An activity in a neuron is signified by Xi. Connections that occur between the neurons are represented by w, the weight factor or strength. Therefore for a node i linked to node j, then the connecting weight is represented as Wij. All inputs are increased by the weighting factor to give them strength. All incoming signs to the neuron are summed up. The summed input result is conceded as a disagreement to the activation function for further computation, which will give result or output value of a node. The result of the activation function signified as f is given as Xj.

B. Activation functions and Reduction

The activation function acts as the conclusion engine of the neuron acting upon the summed input it obtains. The activation function determines when it is suitable for a neuron to be active subject to the quantified verge when reached or not. In this work, the training is exposed to a number of activation functions that comprise the undeviating, sigmoid and hyperbolic curve activation functions. An activation function that best addressed the problem was selected after showing trials to assess the activation functions with reverence to the problem at hand. The entire network results are found after the output neurons are stimulated. The obtained results are then availed either to individuals for their use or to another course requiring them. If the desired output is not obtained, nonconformity might have occurred throughout training signalling an error. The error can be amended by altering the weight denoted as Wij that are among the neuron links. The degree of error has to be recognized first.

In order to get the general difference for the data set presented to the MLP-NN, we have to sum the output above all input vectors where the number of inputs is represented by S.The consequential output is a function of the involvement of many determinants including inputs, loads and the error too. This error needs to be eliminated if the results are to match what is chosen in the training before we can trust the MLP-NN to work in real life environment. Since the error E is as a consequence of all the weights, it becomes prudent to regulate the effects of each given weight W’s change on the total premeditated error.

Training continues until the error has been minimized.A weight matrix that gave the minimum is created and saved for use in the testing phase and beyond.

C. Testing Phase

In this phase the MLP-NN is subjected to test data and its results are observed and checked against the expected or desirable results. Human intelligence is then sort to compare the results with any deviations being taken note of. The inaccuracy on the validation set is monitored during the training process. The validation error will normally decrease during the initial phase of training similar to the training set error. However, when the ANN begins to over-fit the data, the error on the validation set will typically begin to rise. When the validation error increases for a specified number of iterations, the training is stopped, and the weights that produced the minimum error on the validation set are retrieved [12]. There are at least four different chosen categories of packet dropping attacks in our MANET environment including selfish, sleep deprivation attack, Black hole attack among many other attacks. This research is aimed to detect the malicious packet droppers and solve the multi class problem brought about by several attacks. The scenario has a categorization which details a set of different attacks, nevertheless open for adding more classes. Our output layer gives a variety of outputs which we shall term output states representing various classes.A good example will be to suppose that state [0] represents normal desired scenario, while [1] represents a malicious attack known as sleep deprivation and another state [2] representing packet dropper.

5. Conclusion and Future Work

This unit précises the exploration effort and imitates on the suggested upcoming work.

A. Conclusion

Certain features intrinsic in Mobile ad hoc networks (MANET) makes them liable to numerous attacks such as free entrance for everyone to the wireless medium, an ever-changing topology, dispersed collaboration, and boundaries in their abilities like memory and control. MANET’s safety can be aided by Intrusion Detection Systems (IDS) which can act as a succeeding line of defense that is critical to the overall security of the Network. However, designing an IDS in MANET is an intimidating task. Most wired IDS in the market nowadays lack a tactic that is distributive. Fundamental to our examination problem is the design of a pattern that is a scalable approach of interference detection for a MANET. This inquiry utilizes MANET as the core valuation platform. To appraise the detection and classification success of the technique we accept a number of simulations. The recognition / classification technique was gauged on the basis of verifying false positives, precision and false negatives. We measured the proportion of dropped packets when disobedient nodes were dropping the packets. We also mixed the number of nodes disobeying in the network with capabilities to drop packets chaotically.

B. Future Work

Continuing researches have not dedicated abundant time to this area of securing MANETs by a system of intrusion detection organizations. The research undertaken in this paper feature the preliminary work on IDS in MANETs. Countless notable thrilling, thought-provoking impending guidelines are promising in this research expanse: Our focus has been on the network level were we used AODV routing protocol, we will nevertheless seek to extend the procedure to other layers such as Medium Access Control (MAC) layers or application stratums. Explore how to design more discovery strategies especially at the hands of Zero day occurrences and other urbane attacks. Widen the scope beyond MANETs, to combine other technologies like the Internet of Things.

About Essay Sauce

Essay Sauce is the free student essay website for college and university students. We've got thousands of real essay examples for you to use as inspiration for your own work, all free to access and download.

...(download the rest of the essay above)

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Securing MANETs by a system of intrusion detection organizations. Available from:<> [Accessed 19-05-21].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on at an earlier date.

Review this essay:

Please note that the above text is only a preview of this essay.

Review Content

Latest reviews: