{"title":"黑洞和灰洞攻击下自组网IDS的性能研究","authors":"Mozmin Ahmed, M. Hussain","doi":"10.1109/ICECI.2014.6767377","DOIUrl":null,"url":null,"abstract":"In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc. These Networks needs to be protected using firewalls, encryption software, network failure detection schemes for detecting the attacks and minimizing their effects. Many of these schemes designed so far are not absolute and require more supporting systems. Therefore an effective intrusion detection system (IDS) is important to identify the malicious nodes, isolate the problem created by such nodes and notify the information of the malicious node to the other nodes. The ultimate aim of these schemes is to provide the necessary security cover to the network by adding encryption to maintain confidentiality and integrity. In this paper, we introduce a novel Intrusion Detection System (IDS) and examine the performance of the network by introducing. Black Hole Attack and Gray Hole Attack. The proposed work is simulated using ns 2.35 in Debian Linux 6. The result of simulations shows the comparison considering the total packet drop and network throughput. The AODV [1][2] protocol in ns is modified (blackholeaodv and grayholeaodv protocol) to simulate both the attacks. Similarly, the AODV protocol is modified (idsaodv protocol) to implement the IDS (Intrusion Detection System) for the attacks [4][6].","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks\",\"authors\":\"Mozmin Ahmed, M. Hussain\",\"doi\":\"10.1109/ICECI.2014.6767377\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc. These Networks needs to be protected using firewalls, encryption software, network failure detection schemes for detecting the attacks and minimizing their effects. Many of these schemes designed so far are not absolute and require more supporting systems. Therefore an effective intrusion detection system (IDS) is important to identify the malicious nodes, isolate the problem created by such nodes and notify the information of the malicious node to the other nodes. The ultimate aim of these schemes is to provide the necessary security cover to the network by adding encryption to maintain confidentiality and integrity. In this paper, we introduce a novel Intrusion Detection System (IDS) and examine the performance of the network by introducing. Black Hole Attack and Gray Hole Attack. The proposed work is simulated using ns 2.35 in Debian Linux 6. The result of simulations shows the comparison considering the total packet drop and network throughput. The AODV [1][2] protocol in ns is modified (blackholeaodv and grayholeaodv protocol) to simulate both the attacks. Similarly, the AODV protocol is modified (idsaodv protocol) to implement the IDS (Intrusion Detection System) for the attacks [4][6].\",\"PeriodicalId\":315219,\"journal\":{\"name\":\"International Conference on Electronics, Communication and Instrumentation (ICECI)\",\"volume\":\"355 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Electronics, Communication and Instrumentation (ICECI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECI.2014.6767377\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electronics, Communication and Instrumentation (ICECI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECI.2014.6767377","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
摘要
在移动自组网(manet)中,与有线网络相比,对系统的安全性要求更高。无线网络容易受到许多攻击,如黑洞攻击,灰洞攻击,虫洞攻击,下沉洞,睡眠剥夺折磨,Sybil攻击等。这些网络需要使用防火墙、加密软件、网络故障检测方案来保护,以检测攻击并尽量减少其影响。目前设计的许多方案都不是绝对的,需要更多的支持系统。因此,一个有效的入侵检测系统(IDS)对于识别恶意节点,隔离这些节点产生的问题,并将恶意节点的信息通知给其他节点至关重要。这些方案的最终目的是通过添加加密来为网络提供必要的安全保护,以保持机密性和完整性。本文介绍了一种新的入侵检测系统(IDS),并通过引入入侵检测系统来检验网络的性能。黑洞攻击和灰洞攻击。本文在Debian Linux 6中使用ns 2.35进行了仿真。仿真结果显示了考虑总丢包量和网络吞吐量的比较。修改了ns中的AODV[1][2]协议(blackholeaodv和grayholeaodv协议)来模拟这两种攻击。类似地,对AODV协议进行修改(idsaodv协议)来实现针对攻击的IDS (Intrusion Detection System)[4][6]。
Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks
In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc. These Networks needs to be protected using firewalls, encryption software, network failure detection schemes for detecting the attacks and minimizing their effects. Many of these schemes designed so far are not absolute and require more supporting systems. Therefore an effective intrusion detection system (IDS) is important to identify the malicious nodes, isolate the problem created by such nodes and notify the information of the malicious node to the other nodes. The ultimate aim of these schemes is to provide the necessary security cover to the network by adding encryption to maintain confidentiality and integrity. In this paper, we introduce a novel Intrusion Detection System (IDS) and examine the performance of the network by introducing. Black Hole Attack and Gray Hole Attack. The proposed work is simulated using ns 2.35 in Debian Linux 6. The result of simulations shows the comparison considering the total packet drop and network throughput. The AODV [1][2] protocol in ns is modified (blackholeaodv and grayholeaodv protocol) to simulate both the attacks. Similarly, the AODV protocol is modified (idsaodv protocol) to implement the IDS (Intrusion Detection System) for the attacks [4][6].