Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Survey on MANET Intrusion Detection
Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah
Pages - 1 - 11     |    Revised - 15-08-2007     |    Published - 30-08-2007
Volume - 2   Issue - 1    |    Publication Date - February 2008  Table of Contents
MORE INFORMATION
KEYWORDS
Intrusion Detection System (IDS), MANET, Survey, Wireless Ad hoc Network
ABSTRACT
In recent years, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to be attacked than wired network. These vulnerabilities are nature of the MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operation. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to “detect and response” these newer attacks, i.e. “intrusion detection”. This paper aims to explore and to classify current techniques of Intrusion Detection System (IDS) aware MANET. To support these ideas, a discussion regarding attacks, IDS architectures, and researches achievement on MANET are presented inclusively, and then the comparison among several researches achievement will be evaluated based on these parameters. By this way, several existing security problems on MANET can be probed quickly for future researches.
CITED BY (36)  
1 Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305.
2 Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22.
3 Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141.
4 masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1).
5 Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242.
6 EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1).
7 Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs.
8 Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
9 Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
10 Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática).
11 Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337.
12 Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20).
13 Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation).
14 Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
15 Subha, P. S., & Moses, J. C. A Survey of Various Risk Mitigating Techniques in MANET Environment.
16 Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
17 Daniel, J. V., Joshna, S., & Manjula, P. (2013). A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks. International Journal of Computer Science and Mobile Computing, 2(9).
18 Singh, D., & Bedi, S. S. (2013). A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications, 82(5).
19 Butun, I. (2013). Prevention and Detection of Intrusions in Wireless Sensor Networks.
20 Kundu, A., Kundu, T. K., & Mukhopadhyay, I. Survey on Intrusion Detection and Prevention System: A MANET Perspective.
21 Kisku, B., & Datta, R. (2012, December). An energy efficient scheduling scheme for intrusion detection system in mobile ad-hoc networks. In Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on (pp. 1-6). IEEE.
22 Singh, O., & Singh, J. (2012). Comparative Study of Various Distributed Intrusion Detection Systems for WLAN.
23 Srinivasan, S., & Alampalayam, S. P. (2012). Intrusion Detection Algorithm for MANET. Privacy Solutions and Security Frameworks in Information Protection, 163.
24 Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707.
25 M. Karami, M. K. Rafsanjani, A. H. F. Navid and Y. Yavari, “QAIDS: Quantitative and Agent based Intrusion Detection System”, Computer and Information Science, 4(2), pp. 64-74, 2011.
26 Y. Singh and S. K. Jena, “Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks”, Computer Science Advances in Parallel Distributed Computing Communications in Computer and Information Science, 203(1), pp. 410-419, 2011.
27 Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30(1), 63-80.
28 Manikandan, S. P., & Manimegalai, R. (2011). Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks. International Journal on Computer Science and Engineering, 3(9), 3243.
29 Saraydayran, J., Benali, F., & Paffumi, L. (2011). A Survey on new Threats and Countermeasures on Emerging Networks. INTECH Open Access Publisher.
30 Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press.
31 S. Mandala, M. A. Ngadi, A. H. Abdullah and A. S. Ismail, “A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol”, Computer Science Recent Trends in Wireless and Mobile Networks Communications in Computer and Information Science, 84(1), pp. 87-98, 2010.
32 Qasem, M. A. Rassam, “Anomaly intrusion detection system using immune network with reduced network traffic features”. Thesis Masters, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 2010.
33 Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284.
34 Husain, S., Gupta, S. C., Chand, M., & Mandoria, H. L. (2010, September). A proposed model for Intrusion Detection System for mobile adhoc network. In Computer and Communication Technology (ICCCT), 2010 International Conference on (pp. 99-102). IEEE.
35 Menaria, S., Valiveti, S., & Kotecha, K. (2010). Comparative study of distributed intrusion detection in ad-hoc networks. International Journal of Computer Applications, 8(9), 11-16.
36 Lacey, T. H. (2010). Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks (No. AFIT/DCS/ENG/10-07). AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND MANAGEMENT.
1 Google Scholar 
2 Academic Journals Database 
3 Academic Journals Database 
4 ScientificCommons 
5 Academic Index 
6 CiteSeerX 
7 refSeek 
8 iSEEK 
9 Socol@r  
10 ResearchGATE 
11 Libsearch 
12 Libsearch 
13 Bielefeld Academic Search Engine (BASE) 
14 Scribd 
15 WorldCat 
16 SlideShare 
17 SlideShare 
18 PDFCAST 
19 PdfSR 
A. Mishra, K. Nadkarni, and A. Patcha. “Intrusion Detection in Wireless Ad Hoc Networks”. IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, 2004.
A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, “Handbook of Applied Cryptography”. CRC Press, Inc., USA (2001)
B. DeCleene et al. “Secure group communications for wireless networks”. IEEE Military Communications Conference, 2001.
B. Sun, K.Wu, and U. W. Pooch. “Alert Aggregation in Mobile Ad Hoc Networks”. The 2003 ACM Workshop on Wireless Security in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78, 2003.
C. Douligeris, A. Mitrokosta, “DDoS attacks and defense mechanisms: classification and state-of-the-art”. Computer Networks: The International Journal of Computer and Telecommunications Networking 44 (5):643–666, 2004
C. Endorf, E. Schultz and J. Mellander, ”Intrusion Detection & Prevention”, McGraw-Hill, ISBN: 0072229543 (2004)
C. Ko, J. Rowe, P. Brutch, K. Levitt, “System Health and Intrusion Monitoring Using a hierarchy of Constraints”. In Proceedings of 4th International Symposium, RAID, 2001.
C. Krugel and T. Toth. “Applying mobile agent technology to intrusion detection”. In ICSE Workshop on Software Engineering and Mobility, 2001.
C.E Perkins, E. Belding-Royer. “Ad hoc On-demand Distance Vector (AODV)”, Request For Comments (RFC) 3561, 2003
C.E. Perkins, P. Bhagwat. “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers”. SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, 1994
C.M. Chlamtac, J.J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges”, Ad Hoc Networks 1, 2003
D. Sterne, P. Balasubramanyam, et al. “A General Cooperative Intrusion Detection Architecture for MANETs”. In Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, 2005
D.B. Johnson, D.A. Maltz, et.al. “The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR)”. Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress, 2002
D.E. Denning, “An Intrusion-Detection Model”. IEEE Transactions on Software Engineering, pp. 222- 231, 1987
E.C.H. Ngai, M.R. Lyu, R.T. Chin. “An authentication service against dishonest users in mobile ad hoc networks”, IEEE Proceedings on Aerospace Conference, vol. 2, pp. 1275– 1285 2004.
G. Florez, S.M. Bridges, and R.B. Vaughn, “An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection”. The North American Fuzzy Information Processing Society Conference, New Orleans, LA, 2002
H. Debar, M. Becker and D. Siboni. “A Neural Network Component for an Intrusion Detection System”. Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 240-250, 1992
H. Debar, M. Dacier, and A.Wespi, “A Revised Taxonomy for Intrusion-Detection Systems”. Annales des Telecommunications, pp. 361-378, 2000
H. Yang, H.Y. Luo, et.al. “Security in Mobile Ad Hoc networks: challenges and solutions”. IEEE Wireless Communications, pp.38–47, 2004.
J. Hubaux, L. Buttya´n, S. Capkun, “The quest for security in mobile ad hoc networks.” The 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001
J. Kong et al. “Adaptive security for multi-layer ad-hoc networks”. Special Issue of Wireless Communications and Mobile Computing, John Wiley Inter Science Press (2002)
J. P. Anderson. “Computer Security Threat Monitoring and Surveillance”. Technical Report, James P. Anderson Co., Fort Washington, PA, 1980
J. R. Douceur. “The sybil attack”. The 1st International Workshop on Peer-to-Peer Systems pp. 251–260, 2002.
L. Blazevic et al. “Self-organization in mobile ad-hoc networks: the approach of terminodes”, IEEE Communications Magazine , pp. 166–173, 2001
L. Zhou and Z. J. Haas. “Securing ad hoc networks”. IEEE Network Magazine , 1999
N. Ye, X. Li, et.al. “Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data”. IEEE Transactions on Systems, Man, and Cybernetics, pp. 266-274, 2001
O. Kachirski, R. Guha. “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks.” Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS’03), IEEE, 2003
P. Albers, O. Camp, et al. “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches”. Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.
P. Kyasanur, N. Vaidya. “Detection and handling of MAC layer misbehavior in wireless networks”. International Conference on Dependable Systems and Networks. pp. 173–182, 2003
P. Papadimitratos, Z.J. Haas, E.G. Sirer, “Path set selection in mobile ad hoc networks”, The Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 1–11, 2002
P. Porras and A. Valdes, “Live Traffic Analysis of TCP/IP Gateways”. ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1998
P.A. Porras and R. Kemmerer, “Penetration State Transition Analysis C a Rule-Based Intrusion Detection Approach”. The 8th Annual Computer Security Application Conference, pp. 220-229, 1992
S. Bo, W. Kui, U.W. Pooch. “Towards adaptive intrusion detection in mobile ad hoc networks”. IEEE Global Telecommunications Conference, pp. 3551–3555, 2004
S. Forrest, S.A. Hofmeyr, and A. Somayaji. “Computer Immunology”. Communications of the ACM, pp. 88-96, 1997
T. Anantvalee and J. Wu. “A Survey on Intrusion Detection in Mobile Ad Hoc Networks”, Book Series Wireless Network Security, Springer, pp. 170 – 196, ISBN: 978-0-387-28040-0 (2007)
T. Clausen, P. Jaquet, et.al. “Optimized link state routing protocol”. Internet Draft, draft-ietfmanet- olsr-06.txt, work in progress, 2001
W. Lee, S.J. Stolfo, K.W. Mok. “A Data Mining Framework for Building Intrusion Detection Models”. IEEE Symposium on Security and Privacy (Oakland, California), 1999
W. Zhang, R. Rao, et. al. “Secure routing in ad hoc networks and a related intrusion detection problem”, IEEE Military Communications Conference (MILCOM), vol. 2, 13–16 p. 735– 740, 2003
Y. Hu, A. Perrig, and D. Johnson. “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks”. In Proceedings of IEEE INFOCOM’03, 2003
Y. Hu, A. Perrig, and D. Johnson. “Rushing attacks and defense in wireless ad hoc network routing protocols”. In Proceedings of ACM MobiCom Workshop - WiSe’03, 2003
Y. Hu, A. Perrig, D. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks”. ACM MOBICOM, 2002
Y. Zhang, W. Lee, and Y. Huang. “Intrusion Detection Techniques for Mobile Wireless Networks”. Wireless Networks Journal (ACM WINET), 9(5): 545-556, 2003.
Y. Zhang, W. Lee, “Intrusion detection in wireless ad-hoc networks”, The 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283, 2000
Mr. Satria Mandala
- Malaysia
satriamandala@hotmail.com
Mr. Md. Asri Ngadi
- Malaysia
Mr. A.Hanan Abdullah
-- - Malaysia


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS