BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad h...

Full description

Bibliographic Details
Main Authors: HUSAIN SHAHNAWAZ, GUPTA S.C.
Format: Article
Language:English
Published: Taylor's University 2012-10-01
Series:Journal of Engineering Science and Technology
Subjects:
Online Access:http://jestec.taylors.edu.my/Vol%207%20Issue%205%20October%2012/Vol_7_5_623-634_HUSAIN%20SHAHNAWAZ.pdf
_version_ 1829116304757358592
author HUSAIN SHAHNAWAZ
GUPTA S.C.
author_facet HUSAIN SHAHNAWAZ
GUPTA S.C.
author_sort HUSAIN SHAHNAWAZ
collection DOAJ
description Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET) where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS). Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system.
first_indexed 2024-12-12T16:29:16Z
format Article
id doaj.art-530b211162a34b1286160909afa98982
institution Directory Open Access Journal
issn 1823-4690
language English
last_indexed 2024-12-12T16:29:16Z
publishDate 2012-10-01
publisher Taylor's University
record_format Article
series Journal of Engineering Science and Technology
spelling doaj.art-530b211162a34b1286160909afa989822022-12-22T00:18:48ZengTaylor's UniversityJournal of Engineering Science and Technology1823-46902012-10-0175623634BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKHUSAIN SHAHNAWAZGUPTA S.C.Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET) where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS). Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system.http://jestec.taylors.edu.my/Vol%207%20Issue%205%20October%2012/Vol_7_5_623-634_HUSAIN%20SHAHNAWAZ.pdfBlack hole attackDenial of service attackDetection engineIntrusion detection systemFriend featuresMobile Adhoc network
spellingShingle HUSAIN SHAHNAWAZ
GUPTA S.C.
BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK
Journal of Engineering Science and Technology
Black hole attack
Denial of service attack
Detection engine
Intrusion detection system
Friend features
Mobile Adhoc network
title BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK
title_full BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK
title_fullStr BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK
title_full_unstemmed BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK
title_short BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK
title_sort black hole attack in aodv friend features unique extraction to design detection engine for intrusion detection system in mobile adhoc network
topic Black hole attack
Denial of service attack
Detection engine
Intrusion detection system
Friend features
Mobile Adhoc network
url http://jestec.taylors.edu.my/Vol%207%20Issue%205%20October%2012/Vol_7_5_623-634_HUSAIN%20SHAHNAWAZ.pdf
work_keys_str_mv AT husainshahnawaz blackholeattackinaodvfriendfeaturesuniqueextractiontodesigndetectionengineforintrusiondetectionsysteminmobileadhocnetwork
AT guptasc blackholeattackinaodvfriendfeaturesuniqueextractiontodesigndetectionengineforintrusiondetectionsysteminmobileadhocnetwork