ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Intrusion Detection in Manet

Prof. Mrs. Poonam Gupta1, Mrs. Mugdha Kirkire2
  1. Head of the Dept, Dept. of Computer Engineering, GHRCEM, Pune, India
  2. Lecturer, Dept. of Computer Engineering, GHRCEM, Pune, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

Now days mobile ad hoc networks (MANETs) have become a very important research topic as no of mobile users are incremented day by day. MANET will provide communications in the network without any of a fixed infrastructure so it can be used for many applications such as rescue operations, tactical operations, environmental monitoring, conferences, also. But the flexibility in such environment have the challenged of risk of security. Our system supports mainly two parts. 1. To detect intruder attacks in mobile ad hoc network (MANET). 2. To detect the type of attack in mobile ad hoc network (MANET) and apply local intrusion detection or network intrusion detection for the attack. It will work for both anomaly detection and misuse detection mechanism. By the Observation of the attack signatures, we find that there are some attack signatures dependent on other previous attack signatures. This is due to the new attack is a derivative from the previous attack. To apply the intrusion detection technique this paper introduces a priory known approach known as acknowledgement based approach which is used to detect intrusion in mobile ad hoc network (MANET) and uses intrusion detection technique like matching algorithm. It approaches a technique of developing a network safety by describing network behaviour structure that point out offensive use of the network and also look for the occurrence of those patterns while such an approach may be accomplished of detecting different types of known intrusive actions, it would allow new or undocumented types of attacks to go invisible. As a result, this leads to a system which monitors and learns normal network behavior and then detects deviations from the normal network behaviour.

 

Keywords

MANET, IDS, 2ack, anomaly based, signature based.

INTRODUCTION

The current development of mobile communications allows users to be connected to any kind of network, including GSM, WLAN, Bluetooth etc, almost everywhere. The demand on mobility pushes the research and development to new, faster and long-distance communication techniques. Besides the traditional networks with infrastructure the demand on fast and spontaneously deployable networks arises. Ad hoc networks are not only used where the deployment has to be done rapidly, but also where it is not possible or not economic to use or to build up an infrastructure. Nowadays, it is no problem to build an ad hoc network using only two mobile devices, e.g., two notebooks. The only requirement is that they have a communication interface. This development requires advances in security. However, a lot of known security measures cannot be used in an ad hoc environment or have to be adapted to the circumstances. Security is mainly achieved by prevention, i.e. to make attacks as difficult as possible. However, once an attack has been successful, it has to be recognized and the appropriate actions have to be triggered. This is the part of the detection. Its goal is to minimize the damage of the attack. Intrusion detection has to deal with different difficulties. The detection of an intrusion has to be done in a fast and effective manner. However, it must not produce many false alarms. IDSs are originally designed for wired networks and work only under certain conditions, i.e. having an infrastructure with central authority, no cooperative algorithms, only slowly changing topology etc. These conditions are not or only partially fulfilled by MANETs.

OVERVIEW

A. Vulnerabilities of Mobile Wireless Networks

The Characteristics of mobile networking environment introduce vulnerability in it for various attacks. There different attacks on wireless link such as passive eavesdropping and active interfering. As in wired networks communication is possible through physical access of the network wires or passes through different devices as firewalls and gateways, on other hand wireless network can be attacked by any node and from directions and also it attack on any node. Attacks can include getting access to confidential information, message scrambling, and intermediate node act as sender or receiver. As per above information it is cleared that ad-hoc network does not have a exact way or line for protection, so every node Can be worked as a monitor. In mobile adhoc network all nodes can roam independently which indicates nodes which does not having fixed architecture can be attacked and compromised easily. As it is very difficult to keep track of any mobile node in a huge global network, attacks from such a nodes are difficult to detect and can be more dangerous to network. So in ad-hoc network mobile nodes and infrastructure can not have trust based relationship. Next point to be considered is in mobile adhoc network is it has decentralized scheme it is difficult in decision making which can be possible with the help of cooperative algorithms in network. As no centralized node is present attack on cooperative behavior by misbehaving node is also possible. So here main important pint is mobile nodes are more prone to attack due to suspicious node, no fixed infrastructure, dynamically change in network topology , lack of a clear line of defence and decentralized monitoring scheme.

B. The Need for Intrusion Detection

There are different intrusion prevention techniques such as cryptography, authentication and encryption which can be used to detect intruder in ad-hoc network but it can not be used for intrusion protection system in a network. As encryption and authentication can be used in public key cryptography but it can not be protective against selfish mobile nodes with the private keys. In case of routing in Manet which will work on trustworthiness of other nodes where the weak node can be hack more easily which introduces attack in network. So it is necessary to introduce intrusion detection and intrusion prevention technique with some response system. In this paper, we mainly consider on one of the type of mobile computing named as mobile ad-hoc networks, here we propose a new structure and techniques for intrusion detection system and response system . Here firstly this paper represents IDS background and then introduces new techniques for IDS.

INTRODUCTION TO MANET

A mobile Ad-hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies [2]. The Dynamic topology of wireless Ad-Hoc network allows the node to join and leave the network at any point of time. This generic characteristic of wireless Ad-hoc network has rendered it vulnerable to security attacks. Attackers maybe of any type. Identifying the attack type and providing the solution to the real time attacks can be done in real-time, by forming multiple numbers of wireless nodes in the cluster, cluster head, and implementing the Dynamic Source Routing (DSR) protocol, detection of attack types, prevention of attacks, etc.
There are several ways to categorize IDS. Misuse detection vs. anomaly detection: in misuse detection, the IDS analyze the information it gathers and compares it to large databases of attack signatures. Mainly in IDS it checks specific attack which is already stored or documented. As in a system used for detecting viruses is based on misuse detection where pattern stored in databases of attack compare with the packets coming in a network. Where as in anomaly detection system baseline is decided by administrator also it checks normal behavior of system, network’s traffic load, link breakdown, protocol used, and packet size etc. The anomaly detector node can monitor segments of a network and compare it to the normal behavior and find out anomalies.

C. Types of MANET

1) Closed MANET
In a closed MANET, all mobile nodes communicate with each other by cooperating with each other with a common goal, such as it can be used in emergency services, rescue or military operations and law enforcement operation.
2) Open MANET
In an open MANET, various mobile nodes having different goals share resources with global connectivity. But in some cases the nodes refuses to share its data, called as selfish nodes or misbehaving nodes.
D. Routing Protocols in MANET
Routing protocols between any pair of nodes within an ad hoc network can be difficult because the nodes can move randomly and can also join or leave the network. This means that an optimal route at a certain time may not work seconds later. Following are protocols that are used in MANET.
1) Dynamic source Routing Protocol (DSR)
DSR uses source routing to deliver packets through MANET. That is, the sender of a data packet finds a source route (i.e., a full path from the sender to the receiver) and includes it in the packet header the intermediate nodes use this information to determine whether they should accept a packet and where to forward it. The protocol operates on two mechanisms: route discovery and route maintenance. Route discovery: Route discovery is used when the packet sender has not yet known the correct path to the packet destination. It works by broadcasting a ROUTE REQUEST message throughout the network in a controlled manner until it is answered by a ROUTE REPLY message from either the destination itself or an intermediate node that knows a valid path to it. For better performance, the source and intermediate routes save the route information in cache for future use. Furthermore, intermediate nodes can also learn new routes by eavesdropping to other route discovery messages taken place in the neighbourhood. Route maintenance: Finally, route maintenance mechanism is used to notify source and potentially trigger new route discovery events when changes in the network topology invalidate a cached route.
2) Ad Hoc on-Demand Distance Vector Routing Protocol (AODV)
ADHOC on Demand Distance Vector Routing (AODV) is an improvement of Destination sequenced distance vector routing (DSDV) as it minimizes the number of required broadcasts since it creates routes in an on-demand basis, in contrast to Destination Sequenced Distance Vector routing (DSDV) which maintains a complete set of routes Ad hoc On-demand Distance Vector Routing Protocol uses an on demand approach for finding routes, that is, a route is established only when it is required by a source node for transmitting data packets. It employs destination sequence numbers to identify the most recent path.
3) Temporally Ordered Routing Algorithm
TORA uses a metric referred to as the height of the node to assign a direction to links for forwarding packets to a given destination. The node heights can be totally ordered lexicographically, and thus define a directed acyclic graph rooted at the destination.

ATTACKS IN MANET

From the point of view of intrusion detection and response, we need to observe and analyze the anomalies due to both the consequence and technique of an attack. While the consequence gives evidence that an attack has succeeded or is unfolding, the technique can often help identify the attack type and even the identity of the attacker. Attacks in MANET can be categorized according to their consequences as the following:
E. Backhole:
All traffic is redirected to a specific node, which may not forward any traffic at all. Routing Loop: A loop is introduced in a route path.
F. Network Partition:
A connected network is partitioned into k (np! = 2) sub networks where nodes in different sub networks cannot communicate even though a route between them actually does exist.
G. Selfishness:
A node is not serving as a relay to other nodes.
H. Sleep Deprivation:
A node is forced to exhaust its battery power.
I. Denial-of-Service:
A node is prevented from receiving and sending data packets to its destinations
Some of the common attacking techniques are:
A. Cache Poisoning:
Information stored in routing tables is either modified, deleted or injected with false information. Fabricated Route Messages: Route messages (route requests, route replies, route errors, etc.) with malicious contents are injected into the network. Specific methods include:
1) False Source Route:
An incorrect route is advertised into the network, e.g., setting the route length to be 1 regardless where the destination is.
2) Maximum Sequence:
Modify the sequence held in control messages to the maximal allowed value. Due to some implementation issues, a few protocol implementations cannot effectively detect and purge this.
B. Rushing:
This can be used to improve Fabricated Route Messages. In several routing protocols, some route message types have the property that only the message that arrives first is accepted by a recipient. The attacker simply disseminates a malicious control message quickly to block legitimate messages that arrive later.
C. Wormhole:
A tunnel is created between two nodes that can be utilized to secretly transmit packets.
D. Packet dropping:
A node drops data packets (conditionally or randomly) that it is supposed to forward.
E. Spoofing:
Inject data or control packets with modified source addresses.
F. Malicious Flooding:
Deliver unusually large amount of data or control packets to the whole network or some target nodes.

PROBLEMS IN MANET

Originally, IDSs are designed for wired networks, the characteristic of MANETs though generating problems for intrusion detection. These problems of IDS in- MANETs are partially related with the unfavorable characteristics. No Traffic Concentration Points In traditional MANETs, there are no traffic concentration points. This makes it almost impossible to use network based IDSs, which - as already said - captures the traffic at crucial points of the network, i.e. at router, switches or gateways while it is almost impossible to use network based IDSs, the possibility of implementing an IDS is highly constricted. Low Resources Due to mobility and energy saving considerations mobile devices have only low resources: low CPU power and very limited memory.
The smaller the frequency (and voltage) of a CPU is, the less energy it consumes. The dimensions of the mobile devices are the reason for the small amount of memory. Depending on other IDS analysis, the process of identifying an attack might use a lot of resource .If only limited resources exist, this impedes an effective detection. Definition of Anomaly In a fast changing environment, like in a MANET, it is harder to define a profile of normal activities. That complicates the implementation of anomaly detection in MANETs.
A. Intrusion Response
Detecting an attempt of an attack, an attack or only suspicious activities, the IDS triggers countermeasures i.e. Intrusion Response. The responses can be categorized into two types: active and passive.
1) Active Response
Active response are action that are automatically triggered by the IDS once an intrusion has been detected, there is no need of human interaction. Again, these actions are categorized into three types.
Collect additional Information: In the case of a possible intrusion the IDS gathers additional information. This is done by increasing the level of sensitivity, e.g., it captures not only the traffic on few defined ports, but on every port o r the OS audit trail logs a bigger number of events. The collection of additional information has many reasons. With additional information it is easier to determine whether it is an attack or just a suspicious activity. Moreover, the additional information can be used to rack back to the attacker for legal actions.
Change the Environment: If there is enough information gathered to identify the source of the attack, the IDS might change the environment. If known, it can block traffic from the IP address o the attacker or block traffic on certain ports over which the attacks are conducted.
Take Action against the Intruder: During this action the IDS triggers actions against the intruder or the intruder’s address with the object of stopping the intrusion. However, this might be tempting; this action should be considered at last and only with human support. Particularly due to legal concerns and it might hit uninvolved systems or networks.
2) Passive Response
In these actions the IDS has only a supporting role, it provides the humans with information. Based on the collected information the IDS generate reports for administer, with the object that the administrators can make a decision what to do.
3) Alarms and Notifications
Alarms and notifications are well-known actions. The IDS generates based on its configuration alarms and notifications for the users (e.g., a pop up window on the screen). The content of the notifications vary widely: it can be only short message that an attempt has happened or it can already provide some detailed information, like IP address of the attacker.
4) Reporting and Archiving Capabilities
In the case of an intrusion the IDS generates an entry in a report. These reports are periodically generated for the users. Failsafe Considerations for IDS Responses AN IDS is only feasible, if it cannot easily be defeated. An IDS has, therefore, to provide different fail safe features. Failsafe features are meant to protect the IDS from being defeated. An attack on the IDS is much harder, when the position of it is unknown.
B. Control Strategy
The control strategy of an intrusion detection system defines how the elements and how the input respectively output of IDS are managed. It names three different possibilities of control strategies: centralized, partially distributed and fully distributed.
5) Centralized Control Strategy
In centralized control strategy the main functionalities are performed at one central point of the network. This means all monitoring, detection and reporting is done at the same place. This approach is only applicable in network that has traffic concentration points. Those are points, over which the major part of the traffic is routed, e.g., a gateway. This is required, because of the central monitoring, which is only possible at such points.
6) Partially Distributed Strategy
In partially distributed IDSs the nodes gather individually information, monitor activities and also the detection and analysis is done locally. But, only a central managed node has the responsibility of reporting this approach generates ineluctable overhead traffic for the communication between the individual nodes and the central node.
7) Fully Distributed Strategy
In fully distributed IDSs all functionalities are implemented and performed at each individual node. The intrusio

RELATED WORK

The first IDS for MANETs proposed by Zhang and Lee [13] are distributed and co-operative IDS. In this architecture, every node has an IDS agent which detects intrusions locally and collaborates with neighboring nodes (through high-confidence communication channels) for global detection whenever available evidence is in-conclusive and a broader search is needed. When an intrusion is detected an IDS agent can either trigger a local response (e.g. alerting the local user) or a global response (which coordinates actions among neighboring nodes). Since expert rules can detect only known attacks and the rules cannot easily be updated across a wireless ad hoc network, statistical anomaly-based detection is chosen over misuse-based detection.
Martuza Ahmed, Rima Pal, and NIDS: A network based approach to intrusion detection and prevention, IEEE 2009 [10] introduces a system which detects the routing misbehavior in MANETs (Mobile Ad Hoc Networks). Commonly routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. Node misbehaviors take place, due to the open structure and scarcely available battery-based energy. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuses to forward data packets or delay of packets. Here we proposed the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to moderate their undesirable effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path [12]. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Thus it detects the misbehaving nodes, eliminate them and choose the other path for transmitting the data. The proposed systems consist of multicasting method. So that, the sender can broadcast to the other nodes about the misbehaving nodes. Therefore other nodes can avoid that path and take another path for the data transmission. A distributed architecture consisting of IDS agents and a stationary secure database (SSD) is proposed in the research [2] is consider that all nodes have IDS agents responsible for local detection and collaborating with other agents in need. IDS agents have five components: local audit trail; local intrusion database (LID); secure communication module; anomaly detection modules (ADMs); and misuse detection modules (MDMs). The local audit trail gathers and stores local audit data network packets and system audit data. The LID is a database that keeps information for IDS agents such as attack signatures, patterns of normal user behavior, etc. The secure communication module is used only by IDS agents to communicate securely with other IDS agents. ADMs use anomaly-based detection techniques to detect intrusions. There can be more than one ADM module in an IDS agent, for example using different techniques for different kinds of audit data. There are also MDMs responsible for misuse-based detection to detect known attacks. The stationary secure database (SSD) maintains the latest attack signatures and latest patterns of normal user behaviors. It is to be held in a secure environment. Mobile agents get the latest information from the SSD and transfer their logs to the SSD for data mining. The SSD has more storage and computation power than mobile nodes, so it is capable of mining rules faster than the nodes in the network and can keep all nodes logs. One of the architecture proposed in the Intrusion detection in fuzzy logic technique a tool which provides a mathematical tool for dealing with uncertainty of and imprecision that is evolved in human rezoning .With help of fuzzy logic this system is able to identify attacks as black hole attack, gray hole attack etc. One of the paper known as MASID (Multi-Agent System for Intrusion Detection), a new intrusion detection system for MANET in which a collection of agents is in charge of performing a distributed and cooperative intrusion detection[5]. By using agents system look not only for a complete automation of the detection process but also to take advantage of the interesting characteristics presented by an agent technology in order to achieve better detection rates coupled with low use of both host and network resources and time.

PROGRAMMER’S DESIGN

The proposed system consists of mainly following parts:
Part I: Identification of Intrusion attack on MANET of misbehaving link.
Part II: Introducing IDS for MANET to identify a misbehaving node and take a appropriate action.
a) Creation of Mobile Adhoc Network.
b) Adding new node in MANET.
c) Identifying attacking node on MANET.
d) Providing information regarding attacks in the network to avoid intrusion attack.
A. PART I: Identification of Intrusion attack on MANET of misbehaving link.
The proposed system consists of mainly following parts: - a) Identifying attacking node on MANET. b) Providing information regarding attacks in the network to avoid intrusion attack.
Identifying misbehaving link using 2ack scheme: In the system of detecting intruder the first part is to find the route. The route is shortest route among all the possible routes. Once transmission starts on the network main part is to detect the link between the nodes of the selected route where any kind of misbehaving is done by node. To find out the misbehaving link on the route one of the technique is to consider acknowledgement send by the receiver if receiver is not properly acknowledged then there is problem in the network. To consider acknowledgement there are different techniques as
1) Watchdog and Path rater:
Watchdog and path rater are the techniques to detect and mitigate, respectively, routing misbehavior in MANETs. End to End Ack:-It contains the acknowledgments (ACKs): to detect routing misbehavior and the Selective acknowledgement
2) The TWOACK and S-TWOACK Schemes:
It contains,
TWOACK: TWOACK packets are sent for every data packet received,
S-TWOACK: each TWOACK packet in the S-TWOACK scheme acknowledges the receipt of a number of data packets.
3) 2ACK:
One of the efficient techniques is 2ACK. Here we have to consider the triplet of nodes. In each triplet consider node N1, N2, N3. The working of 2ACK is as follows:
At first node N1 will be consider as a sender. Here the assumption is that the shortest path routing algorithm will provide the path link from source node to destination node. Now suppose in triplet there are three nodes on the shortest path as N1, N2, and N3. N1 will work as a sender and it will send the data to next intermediate node N2 and it is assumed that N2 has to forward the data to N3. When N1 starts sending data it will also starts the timer to wait for the acknowledgement from node N3 and N2. And when N3 receives the packet it has to send acknowledgement of received packet on the same line but in reverse direction.
Here we can consider three cases:
1) Best case.
In best case it is consider that sender sends the packet to node N2 and start the timer to wait for the acknowledgement then N2 forwards the packet to N3 and on receiving the packet node n3 sends the acknowledgement on reverse direction.N1 will get the acknowledgement before time out. So there is smooth transmission of packet.
2) Average Case
In the average case we have to consider that Node N1 is not receiving the acknowledgement within time t. So there is problem in the link.
3) Worst case
In the worst case if the node N2 is misbehaving either it will send the acknowledgement in very short time which indicates there is a problem in link N2 and N3. Now Node N1 get to know that link N2 to N3 is misbehaving link using the algorithm 2ack.ACk Using 2ACK if the time required for sending data is less than the wait time and intermediate node contains same message as original, the sender is massaged that the l ink is working properly Using 2ACK if the time required for sending data is more than the wait time and intermediate node contains same message as original, the sender is massaged that the link is misbehaving. Using 2ACK if the time required for sending data is more than the wait time and intermediate node does not contain same message as original, the sender is massaged that the link is misbehaving and confidentiality is lost.
Need of 2ack: Even though in the watchdog detection mechanism has a low overhead .But the watchdog technique have some l problems such as ambiguous collisions; receive collisions, and limited transmission power. The important point is that the on the successful reception of packet can be accurately determined at the receiver of the next-hop link, where as in the watchdog technique or path rater technique it only observes the transmission from the sender of the next-hop link. A misbehaving node can either be the sender or the receiver of the next-hop link, here the problem to be considered of detecting misbehaving links instead of misbehaving nodes.
Working of 2ACK Scheme: Suppose that N1, N2 and N3 are three neighbor nodes forming a triplet along a route. The route from a source node, S, to a destination node, D, is obtained in the Route Discovery phase of the DSR protocol. When N1 forwards data packet to next node N2 and N2 forwards it to its next node N3, N1 is unaware of whether N3 receives the data packet successfully or not. Such an ambiguity and complexity can be possible even in the absence of misbehaving nodes. The problem becomes much more severe in the case of open MANETs infrastructure with misbehaving nodes. On the successful reception of the data packet ID, N3 sends explicit acknowledgment to N1 for its notification in 2ACK scheme. Node N3 sends 2ACK packets in opposite direction to N1 after successful reception of data packets. Hence triplet [N1 -> N2 ->N3] is formed from the original data traffic route where N1, observing node checks the link N2 -> N3.
In 2ACK scheme, data transmitted through the triplet along the route where any node can be acts as a sender or receiver. For detecting misbehavior, the 2ACK packet sender having ID list of forwarded data packets but no record of acknowledged. It maintains counter which is incremented for forwarded data packets within timeouts i.e. ÏD seconds known as cntrpack and Cntrmiss counter which is incremented simultaneously when data packets are not forwarded within timeouts. According to that, nodes are added and removed from the ID list. After receiving a data packet by N3, it takes decision for sending 2ACK packets to N1 and then it will be acknowledged only fraction of data packets via 2ACK packets. This fraction of data packet is called acknowledgment ratio, ackratio. The overhead of 2ACK packet transmission is maintained by varying ackratio. By varying ackratio, it is possible to tune dynamically the overhead of 2ACK packet transmissions. For a period of time termed Tobervations, Node N1 observes the behavior of link N2 -> N3. At the end of Tobservations, N1 performs calculation of Cntrmiss/Cntrpack i.e. the ratio of 2ACK packets which are loosed during the transmission and compares it with a threshold Remiss. If Cntrmiss/Cntrpack Remiss, then link N2-> N3 is declared misbehaving. Since only a fraction of the received data packets are acknowledged Rmis should satisfy remiss in order to eliminate false alarms caused by such a partial acknowledgment technique.
1) Authenticating the 2ACK Packets When the 2ACK packets are forwarded by an intermediate node without proper protection, a misbehaving node N2 can simply fabricate 2ACK packets and claim that they were sent by node N3. Therefore, an authentication technique is can be used to detect such a misbehavior.
2) Acknowledgment Ratio, ackratio The additional routing overhead caused by the transmission of the 2ACK packets can be controlled by the parameter acknowledgment ratio, ackratio, at the 2ACK packet sender. By using the parameter ackratio in the 2ACK scheme, only a fraction of the received data packets will be acknowledged. Means ackratio provides a mechanism to tune the overhead. The reduction of overhead comes with a cost: the shrinking of the range over which Recmiss can take values.
3) Partial Data Forwarding Sometimes selfish node may cheat by forwarding wrong data. Now if N2 is misbehaving which is receiving data from N1, will forward fraction of data to N3 Rpart (0 ¡ Rpart ¡ 1). Thus, N3 receives Rpart, Data packets and only Rack. Rpart data of them will be acknowledged by 2ACK packets sent from N3. Therefore, in order to cheat the system, a misbehaving node N2 has to make sure that as the gap between Rack and Rmis shrinks, the feasible value of Rpart approaches 1. Hence 2ACK guards the partial forwarding.
4) Timeout for 2ACK Reception, ÏD The parameter timeout, ÏD, will be used to set up a timer for 2ACK reception. If packet is received before the expected 2ACK, the timer expires and the missing 2ACK packet counter, Cmis, will be incremented. Thus, ÏD value matters. If timeout is too small false alarms are triggered on contrary node will have to maintain longer list and memory. Therefore, ÏD should be set at a value that is large enough to allow the occurrence of temporary link failures (for example, the unsuccessful transmission due to node mobility or local traffic congestion). A single-hop transmission delay includes packet transmission delay, random back-off delay at the Medium Access Control (MAC) layer, data processing delay, and potential retransmission delay. Hence timeout value should be maintained.
5) Observation Period, Tobservation, and Dynamic Behavior In the 2ACK scheme Tobs distinguishes link misbehaviors and temporary link failures by observing the reception of 2ACK packets over a certain period of time. Such a technique is able to distinguish temporary link failures from link misbehavior.
B. PART II: Introducing IDS for MANET to detect misbehaving node and to take appropriate action.
Once the detection of misbehaving link is done the next important task is to find out the misbehaving node and to take appropriate action on this node. Now to find out misbehaving node on the misbehaving link we will consider following scenario:- 1. Each node on the network is worked as monitor. 2. Each node is having local IDS on it and node is working as monitor, each local IDS runs independently and monitors local activities. It detects misbehaving link using 2ACK algorithm. Now after finding the link it will check with the list of events i.e. evidences on database and also routing table information to detect anomalies in the network. It uses the matching algorithm to match the evidences in the link. If it does not have sufficient evidence or data available, then local IDS on route can help in the detection process, either by participating actively in the response or by providing some additional information. After applying the matching algorithm it will detect the difference in the list of event and now monitored node can easily find out the misbehaving node and multicast the message to remaining node about misbehaving node and also update the database according to that. Also it can store some extra information related that misbehaving node as name or IP address of that node and then disconnect the node from network to avoid future damage in network.
Local IDS Architecture:
Based upon requirement of our system each local IDS can be worked as three agents. These agents perform complementary roles and interact with each other.
1) Monitor:
Monitor captures and collects data about the packets sent down the route. To collect data regarding packets sent, 2 local data sources can be used 1. Database 2. Routing tables Monitor will use relevant data obtained after applying filter or rules on data from data sources.
2) Detection Agent:
It is used to detect the misbehaving node in a system with the output of data
3) Response and Collaborative Agent:
Its function is take a appropriate action on misbehaving node and provide the alert to remaining nodes in the system. We cannot tell if it is experiencing an attack or just a temporary network failure, and cooperation among all nodes is required for the nodes to understand what is going on. The event lists are shared among all nodes in the network. All nodes send their evidences to every other node in the network Part in the protocol. Every node executes the matching algorithm to generate the aggregated event list to have a clear view of what happened in the network in the given time frame. Alert the network about intrusion attack. The basic idea is to set up a monitor at each node in the network to produce evidences and to share them among all the nodes evidence is a set of relevant information about the network state.
Introducing IDS for MANET: Creation of MANET with more than two nodes is done by assigning the authentication method as userid and password for each node. Assigning the IP address is done automatically.
Adding a new node to the network: This part assumes that each node has a maximum of two wireless interfaces. Based on this scenario, the dynamic channel selection algorithm, assigns channels to each link, in such way that, for each node the uplink and downlink connections are configured at different channels.
To reduce interference between non-adjacent links, each newly deployed node will scan the environment and will assign a channel that is not yet in use, to one of its interfaces.
The other interface is set to the default channel. While the underlying character of the network is a mesh topology, due to channel assignment, a relaying network is created. To dynamically assign the channels when a new node is deployed, several messages are exchanged. Provide the security between LOCAL IDS: - As in our system we are using local IDSs running on each individual node of the ad hoc network. Each local IDS can communicate with other local IDSs in the network to pass information of the system or to participate in a global intrusion detection and response. So it is necessary that the information transferred from one local ID to other local IDS must be secured so it will not allow an attacker to gain access to the communication.

CONCLUSION

In this paper we first survey various attacks, problems and solutions in MANET, then here we proposes the intrusion detection system which can find out misbehaving link in reliable manner and in short time also IDS implemented on that node is also reliable. Here we can remove the misbehaving node to avoid the future damage in the network. In future the proposed system will try to implement a concept as priority based detection so that important or prioritized node can be protected first.

Figures at a glance

Figure 1
Figure 1

References