Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A New Intelligent Reputation Based Mobile Intrusion Detection System using a Recovery Protocol


Affiliations
1 Department of CSE, PVPSIT, Affiliated to JNTUK, India
2 Department of CSE, Hannam University, India
     

   Subscribe/Renew Journal


Due to the dynamic nature, lack of centralized control and shared channel, the mobile adhoc networks demands an intrusion detection system suitable for the MAC layer. Many anomaly based mobile intrusion detection systems are given but they could not provide 100% detection rates and perfect false positive rates. Also it is difficult to train the network with all possible attacks. Hence the main aim of this paper is to protect the users data from the damage caused due to the malicious activities and also call dynamic agents. The responsibility of these agents is to identify any unknown attacks and update the intrusion detection system with the unknown attack along with its features. Hence in this paper which is a sequence paper to our earlier mIDS, IRmIDS, we modified our Intelligent Distributed Reputation based Mobile Intrusion Detection System to include dynamic agents and recovery protocol.

Keywords

MAC, SOM, DoS, U2R, IDS, IRmIDS.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 207

PDF Views: 1




  • A New Intelligent Reputation Based Mobile Intrusion Detection System using a Recovery Protocol

Abstract Views: 207  |  PDF Views: 1

Authors

S. Madhavi
Department of CSE, PVPSIT, Affiliated to JNTUK, India
Tai Hoon Kim
Department of CSE, Hannam University, India

Abstract


Due to the dynamic nature, lack of centralized control and shared channel, the mobile adhoc networks demands an intrusion detection system suitable for the MAC layer. Many anomaly based mobile intrusion detection systems are given but they could not provide 100% detection rates and perfect false positive rates. Also it is difficult to train the network with all possible attacks. Hence the main aim of this paper is to protect the users data from the damage caused due to the malicious activities and also call dynamic agents. The responsibility of these agents is to identify any unknown attacks and update the intrusion detection system with the unknown attack along with its features. Hence in this paper which is a sequence paper to our earlier mIDS, IRmIDS, we modified our Intelligent Distributed Reputation based Mobile Intrusion Detection System to include dynamic agents and recovery protocol.

Keywords


MAC, SOM, DoS, U2R, IDS, IRmIDS.