1,141 research outputs found

    Black Hole attack Detection using fuzzy based IDS

    Get PDF
    In the past few years, an evolution in the wireless communication has been emerged, along with the evolution a new type with large potential application of wireless network appears, which is the Mobile Ad-Hoc Network (MANET). Black hole attack consider one of the most affected kind on MANET. Therefore, the use of intrusion detection system (IDS) has a major importance in the MANET protection. In this paper, an optimization of a fuzzy based intrusion detection system is proposed which automate the process of producing a fuzzy system by using an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the initialization of the FIS and then optimize this initialized system by using Genetic Algorithm (GA). In addition, a normal estimated fuzzy based IDS is introduces to see the effect of the optimization on the system. From this study, it is proven that the optimized proposed IDS perform better that the normal estimated systems

    Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks

    Get PDF
    A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes that rely on wireless network interfaces, without the use of fixed infrastructure or centralized administration. In this respect, these networks are very susceptible to numerous attacks. One of these attacks is the black hole attack and it is considered as one of the most affected kind on MANET. Consequently, the use of an Intrusion Detection System (IDS) has a major importance in the MANET protection. In this paper, a new scheme has been proposed by using an Adaptive Neuro Fuzzy Inference System (ANFIS) and Particle Swarm Optimization (PSO) for mobile ad hoc networks to detect the black hole attack of the current activities. Evaluations using extracted database from a simulated network using the Network Simulator NS2 demonstrate the effectiveness of our approach, in comparison to an optimized IDS based ANFIS-GA

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks

    Get PDF
    Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. One of the goals in the research is to find a method to prevent black hole attacks without decreasing network throughput or increasing routing overhead. The routing mechanism in define uses route requests (RREQs; for discovering routes) and route replies (RREPs; for receiving paths). However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. This method avoids dependency exclusively on the hop counts and destination sequence numbers (DSNs) that are exploited by malicious nodes in the standard AODV protocol. The experiment by performance metrics End-to-End delay and packet delivery ratio are compared in order to determine the best effort traffic. The results showed the PGO-DLLA improvement of the shortest and secure routing from black hole attack in MANET. In addition, the results indicate better performance than the related works algorithm with respect to all metrics excluding throughput which AntNet is best in routing when the pause time be more than 40 seconds. PGODLLA is able to improve the route discovery against the black hole attacks in AODV. Experiments in this thesis have shown that PGO-DLLA is able to reduce the normalized routing load, end-to-end delay, and packet loss and has a good throughput and packet delivery ratio when compared with the standard AODV protocol, BAODV protocol, and the current related protocols that enhance the routing security of the AODV protocols

    A Study on Intrusion Detection System in Wireless Sensor Networks

    Get PDF
    The technology of Wireless Sensor Networks (WSNs) has become most significant in present day. WSNs are extensively used in applications like military, industry, health, smart homes and smart cities. All the applications of WSN require secure communication between the sensor nodes and the base station. Adversary compromises at the sensor nodes to introduce different attacks into WSN. Hence, suitable Intrusion Detection System (IDS) is essential in WSN to defend against the security attack. IDS approaches for WSN are classified based on the mechanism used to detect the attacks. In this paper, we present the taxonomy of security attacks, different IDS mechanisms for detecting attacks and performance metrics used to assess the IDS algorithm for WSNs. Future research directions on IDS in WSN are also discussed

    Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Get PDF
    Vehicular ad hoc networks (VANETs) play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs) exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS) that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions

    Using discriminant analysis to detect intrusions in external communication for self-driving vehicles

    Get PDF
    Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS) and black hole attacks on vehicular ad hoc networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection

    A hierarchical detection method in external communication for self-driving vehicles based on TDMA

    Get PDF
    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms

    Intelligent intrusion detection in external communication systems for autonomous vehicles

    Get PDF
    Self-driving vehicles are known to be vulnerable to different types of attacks due to the type of communication systems which are utilized in these vehicles. These vehicles are becoming more reliant on external communication through vehicular ad hoc networks. However, these networks contribute new threats to self-driving vehicles which lead to potentially significant problems in autonomous systems. These communication systems potentially open self-driving vehicles to malicious attacks like the common Sybil attacks, black hole, Denial of Service, wormhole attacks and grey hole attacks. In this paper, an intelligent protection mechanism is proposed, which was created to secure external communications for self-driving and semi-autonomous cars. The protection mechanism is based on the Proportional Overlapping Scores method, which allows to decrease the number of features found in the Kyoto benchmark dataset. This hybrid detection system uses Back Propagation neural networks to detect Denial of Service (DoS), a common type of attack in vehicular ad hoc networks. The results from our experiment revealed that the proposed intrusion detection has the ability to identify malicious vehicles in self-driving and even in semi-autonomous vehicles
    • …
    corecore