Please use this identifier to cite or link to this item:
Title: An efficient framework for intrusion detection system for mobile adhoc networks
Researcher: Shahnawaz Husain
Guide(s): Gupta, S C
Keywords: Computer Science
Black Hole
Worm-Hole Attack
TCP Segment
Denial of Service Attack
Global Data Collection Module
Upload Date: 28-Oct-2013
University: Graphic Era University
Completed Date: July, 2013
Abstract: Most existent protocols, applications and services for mobile Adhoc networks newline(MANETs) assume a cooperative and friendly network environment and do not newlineaccommodate security. In MANETs, intrusion prevention (IPS) and intrusion detection (IDS) techniques need to complement each other to guarantee a highly secure environment. The IPS and IDS play different roles in different states of the network. Intrusion prevention measures, such as encryption and authentication, are more useful in preventing outside attacks. Once the node is compromised, intrusion prevention measures will have little effect in protecting the network. Therefore, an intrusion detection system is serving as the second line of defense in Adhoc network. This thesis used the incremental approach to designing the detection engine for Adhoc network environments. In this thesis a two-layer architecture has been proposed which fits the unique requirement of MANETs. First layer is a local intrusion detection module, which identifies the friends quickly and second layer is a global detection module in which intrusion behavior is checked rigorously before declaring the node as a trusted node or newlinean intruder node. Finally, it adds a voting mechanism to generate the trust level for each node. This proposed model is fast responsive, light weighted and better than the conventional model available in Adhoc network environment. We consider the layered approach for communication and attacks are identified for the network layer which is the soft target of attackers. In this thesis well known security attacks are applied to the mobile Adhoc environment. Statistics are then collected, important features are extracted from raw data set, and rule sets are induced for well known attacks like Denial of Service attack, Black Hole attack and Wormhole attack. Most of the attacks known in Adhoc environment are included in these three kinds of attacks.
Pagination: xv, 99p.
Appears in Departments:School of Computing

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File90.28 kBAdobe PDFView/Open
02_declaration.pdf243.19 kBAdobe PDFView/Open
03_abstract.pdf127.96 kBAdobe PDFView/Open
04_acknowledgement.pdf122.11 kBAdobe PDFView/Open
05_contents.pdf123.33 kBAdobe PDFView/Open
06_list of abbreviations.pdf110 kBAdobe PDFView/Open
07_list of figures.pdf141.8 kBAdobe PDFView/Open
08_list of figures.pdf219.69 kBAdobe PDFView/Open
09_chapter 1.pdf174.75 kBAdobe PDFView/Open
10_chapter 2.pdf476.9 kBAdobe PDFView/Open
11_chapter 3.pdf470.05 kBAdobe PDFView/Open
12_chapter 4.pdf517.1 kBAdobe PDFView/Open
13_chapter 5.pdf1.04 MBAdobe PDFView/Open
14_chapter 6.pdf1.1 MBAdobe PDFView/Open
15_chapter 7.pdf317.41 kBAdobe PDFView/Open
16_appendix.pdf98.8 kBAdobe PDFView/Open
17_references.pdf288.44 kBAdobe PDFView/Open
18_publication.pdf1.91 MBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: