Skip to main content

MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System

  • Conference paper
Computer Information Systems – Analysis and Technologies

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 245))

Abstract

A Mobile Ad Hoc Network (MANET) is a network built on ad hoc demand by some mobile wireless nodes geographically distributed over an area. There is no fixed infrastructure and also no centralized administration. The traditional security measures fail to provide the required security level in MANETs. Specialised detection schemes are to be employed for detecting the intruder attack in MANET. The intrusion detection systems based on mobile agents uses a set of mobile agents moving from one node to another node within a network. The distributed ID consists of multiple mobile agents which cooperate over a large network and communicate with each other. This as a whole reduces network bandwidth usage by moving data analysis computation to the location of the intrusion data & support heterogeneous platforms. In this paper, a mobile agent based IDS have been proposed to detect the black hole attack in MANET, with the aim of reducing computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Roy, D.B., Chaki, R., Chaki, N.: A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. International Journal of Network Security & Its Applications (IJNSA) 1 (April 2009)

    Google Scholar 

  2. Onashoga, S.A., Akinde, A.D., Sodiya, A.S.: A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems. Issues in Informing Science and Information Technology 6 (2009)

    Google Scholar 

  3. Chaki, R., Chaki, N.: IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. In: Proc. of the 6th Int’l Conf. on Computer Information Systems and Industrial Management Applications (CISIM 2007), pp. 179–184 (June 2007)

    Google Scholar 

  4. Jahnke, M., Toelle, J., Finkenbrink, A., Wenzel, A., et al.: Methodolo gies and Frameworks for Testing IDS in Adhoc Networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, pp. 113–122 (2007)

    Google Scholar 

  5. Abraham, A., Jain, R., Thomas, J., Han, S.Y.: D-SCIDS: Distributed soft computing intrusion detection system. Journal of Network and Computer Application 30, 81–98 (2007)

    Article  Google Scholar 

  6. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas of Communications 24(2), 370–380 (2006)

    Article  Google Scholar 

  7. Sodiya, A.S.: Multi-level and Secured Agent-based Intrusion Detection System. Journal of Computing and Information Technology - CIT 14(3), 217–223 (2006), doi:10.2498/cit.2006.03.05

    Article  Google Scholar 

  8. Mitrokotsa, A., Mavropodi, R., Douligeris, C.: Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks, Ayia Napa, Cyprus, July 6-7 (2006)

    Google Scholar 

  9. Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 965–970. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, U.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11, 38–47 (2004)

    Article  Google Scholar 

  11. Hu, Y.-C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and Privacy Magazine 2(3), 28–39 (2004)

    Article  Google Scholar 

  12. Eid, M., Artail, H., Kayssi, A., Chehab, A.: An adaptive intrusion detection and defense system based on mobile agents. In: Innovations in Information Technologies, IIT 2004 (2004)

    Google Scholar 

  13. Li, C., Song, Q., Zhang, C.: MA-IDS: Architecture for distributed intrusion detection using mobile agents. In: 2nd International Conference on Information Technology for Application, ICITA 2004 (2004)

    Google Scholar 

  14. Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.T.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, vol. 3284, pp. 244–253. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, vol. 3, pp. 1976–1986 (2003)

    Google Scholar 

  16. Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. NIST Interim Report (IR) –6416 (October 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roy, D.B., Chaki, R. (2011). MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System. In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27245-5_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27244-8

  • Online ISBN: 978-3-642-27245-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics