Title :
Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks
Author :
Bose, S. ; Kannan, A.
Author_Institution :
Anna Univ., Chennai
Abstract :
Ad hoc networks are a new paradigm of wireless communication for mobile hosts. Security is an important issue for ad hoc networks, especially for those security-sensitive applications. The salient features of ad hoc networks pose both challenges and opportunities in achieving security goals. One such goal is to consider not only malicious attacks launched from outside a network, but also take into account the attacks from within the network by compromised nodes. Various ways are possible to overcome vulnerabilities in Wireless Ad hoc Networks from attacks and threats. One of the most widely used solution is designing an intrusion detection system (IDS) that suites the security needs and characteristics of ad hoc networks for effective and efficient performance against intrusions. This paper investigates the serious and harmful attack, "denial of service" (DoS) that exhibit in multiple forms across different layers of protocol stack. To defend against this attack, we propose a novel approach "cross layer based intrusion detection system"(CIDS) that performs accurate diagnosis of malicious attacks by analyzing the pattern of trace files, overcome the demerits such as false positives present in traditional IDS, thereby providing secure communication between nodes that communicate with each other to route the traffic from source to destination and also increase the efficiency of the network performance. The simulations conducted in ns2 and proved that our work achieved high performance with fewer overheads.
Keywords :
ad hoc networks; protocols; security of data; telecommunication security; wireless LAN; IEEE 802.11; MAC layer; cross layer based intrusion detection system; denial of service attack; malicious attack; network monitor; protocol stack layer; routing layer; signature detection; trace file pattern; wireless ad hoc networks; Ad hoc networks; Communication system security; Computer crime; Cross layer design; Intrusion detection; Mobile ad hoc networks; Pattern analysis; Performance analysis; Protocols; Wireless communication; AODV; Ad hoc Networks; Cross-layer Design; Denial-of-Service(DoS) attacks; IEEE 802.11; Intrusion Detection; MAC layer; Misuse or Signature Detection; Network Monitor; Routing layer; Security;
Conference_Titel :
Signal Processing, Communications and Networking, 2008. ICSCN '08. International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4244-1924-1
Electronic_ISBN :
978-1-4244-1924-1
DOI :
10.1109/ICSCN.2008.4447185