Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion

被引:0
|
作者
Abdelhamid, Ashraf [1 ]
Elsayed, Mahmoud Said [2 ]
Aslan, Heba K. [1 ]
Azer, Marianne A. [3 ]
机构
[1] Nile Univ, Cairo, Egypt
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[3] Natl Telecommun Inst, Cairo, Egypt
关键词
L[!text type='JS']JS[!/text]Adhoc Networks; MANET; Routing Protocols; Blackhole Attacks; ROUTING PROTOCOLS;
D O I
10.1145/3664476.3670941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the contemporary environment, mobile ad hoc networks (MANETs) are becoming necessary. They are absolutely vital in a variety of situations where setting up a network quickly is required; however, this is infeasible due to low resources. Ad hoc networks have many applications: education, on the front lines of battle, rescue missions, etc. These networks are distinguished by high mobility and constrained compute, storage, and energy capabilities. As a result of a lack of infrastructure, they do not use communication tools related to infrastructure. Instead, these networks rely on one another for routing and communication. Each node in a MANET searches for another node within its communication range and uses it as a hop to relay the message through a subsequent node, and so on. Traditional networks have routers, servers, firewalls, and specialized hardware. In contrast, each node in ad hoc networks has multiple functions. Nodes, for instance, manage the routing operation. Consequently, they are more vulnerable to attacks than traditional networks. This study's main goal is to develop an approach for detecting blackhole attacks using anomaly detection based on Support Vector Machine (SVM). This detection system looks at node activity to scan network traffic for irregularities. In blackhole scenarios, attacking nodes have distinct behavioral characteristics that distinguish them from other nodes. These traits can be efficiently detected by the proposed SVM-based detection system. To evaluate the effectiveness of this approach, traffic under blackhole attack is created using the OMNET++ simulator. Based on the categorization of the traffic into malicious and non-malicious, the malicious node is then identified. The results of the suggested approach show great accuracy in detecting blackhole attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [22] Measuring normality in HTTP traffic for anomaly-based intrusion detection
    Estévez-Tapiador, JM
    García-Teodoro, P
    Díaz-Verdejo, JE
    COMPUTER NETWORKS, 2004, 45 (02) : 175 - 193
  • [23] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44
  • [24] An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 99 - 104
  • [25] Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
    Ghafouri, Amin
    Abbas, Waseem
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 415 - 434
  • [26] Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1273 - 1281
  • [27] A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2160 - 2167
  • [28] Anomaly-based intrusion detection using fuzzy rough clustering
    Chimphlee, Witcha
    Abdullah, Abdul Hanan
    Sap, Mohd Noor Md
    Srinoy, Surat
    Chimphlee, Siriporn
    2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, 2006, : 329 - 334
  • [29] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
  • [30] Anomaly-based Intrusion Detection in Computer Networks using Wavelets
    Perlin, Tiago
    Nunes, Raul Ceretta
    Kozakevicius, Alice de Jesus
    REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2011, 3 (01): : 2 - 15