A Simple Scheme for Pseudo Clustering Algorithm for Cross Layer Intrusion Detection in MANET

被引:0
|
作者
Amouri, Amar [1 ]
Jaimes, Luis G. [2 ,3 ]
Manthena, Raju [1 ]
Morgera, Salvatore D. [1 ]
Vergara-Laurens, Idalides J. [3 ]
机构
[1] Univ S Florida, Dept Elect Engn, Tampa, FL 33620 USA
[2] Bethune Cookman Univ, Coll Sci Engn & Math, Daytona Beach, FL 32114 USA
[3] Univ Turabo, Dept Elect & Comp Engn, Gurabo, PR 00778 USA
关键词
MOBILE AD-HOC; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Mobile AdHoc Network (MANET) is a type of wireless network that does not require infrastructure for its operation; therefore, MANETs lack a centralized architecture which affects the level of security inside the network and increases vulnerability. Although encryption helps to increase network security level, it is not sufficient to protect against malicious intruders. An intrusion detection scheme is proposed in this paper based on cross layer feature collection from the medium access control (MAC) and network layers. The proposed method employs an hierarchical configuration that avoids using a clustering algorithm and, instead, sequentially activates the promiscuity (ability to sniff all packets transmitted by nodes within radio range) of the node based on its location in the network. The node in this case acts as a pseudo cluster head (PCH) that collects data from its neighboring nodes in each quadrant in the field and then uses this information to calculate an anomaly index (AI) in each quadrant. The mechanism uses a C4.5 decision tree to learn the network behavior under blackhole attack and is able to recognize blackhole attacks with up to 97% accuracy. The presented approach is twofold -it is energy efficient and has a high degree of intrusion detection with low overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Relative network entropy based clustering algorithm for intrusion detection
    Qian, Quan
    Wang, Tianhong
    Zhan, Rui
    International Journal of Network Security, 2013, 15 (01) : 16 - 22
  • [42] Algorithm for automatic clustering number determination in networks intrusion detection
    Department of Computer Science and Information Engineering, Shanghai Institute of Technology, Shanghai 200235, China
    不详
    不详
    Ruan Jian Xue Bao, 2008, 8 (2140-2148):
  • [43] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [44] Improved K-means clustering algorithm in intrusion detection
    Xiao, ShiSong
    Li, XiaoXu
    Liu, XueJiao
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 771 - 775
  • [45] Improved fuzzy clustering algorithm and its application to intrusion detection
    Chen, Jianmei
    Song, Shunlin
    Lu, Hu
    Song, Yuqing
    Zhu, Yuquan
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2007, 37 (04): : 589 - 592
  • [46] Cross layer Anomaly based intrusion detection system
    Satam, Pratik
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 157 - 161
  • [47] Intrusion Detection based on ant colony algorithm of Fuzzy clustering
    Li, Wei Song
    Duan, Long Zhen
    Bai, Xiao Ming
    Zhang, Xu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1642 - 1645
  • [48] Applying an Improved DBSCAN Clustering Algorithm to Network Intrusion Detection
    Yao, Shunyu
    Xu, Hui
    Yan, Lingyu
    Su, Jun
    PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 865 - 868
  • [49] A cross-layer based optimized feature selection scheme for intrusion detection in wireless sensor network
    Singh, Ghanshyam
    Gavel, Shashank
    Raghuvanshi, Ajay Singh
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 4949 - 4958
  • [50] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Neeraj Kumar
    Jaskaran Preet Singh
    Rasmeet S. Bali
    Sudip Misra
    Sana Ullah
    Cluster Computing, 2015, 18 : 1263 - 1283