Abstract
The paper highlights the problems of rogue dynamic host configuration protocol (DHCP) server that affects and disrupts network resources during communication. The rogue DHCP is unauthorized server that releases incorrect IP address to legal users and sniffs their traffic illegally. The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms and addition of new rules in existing IDS. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention. The work is particularly done to restore the privacy of users over MCL but can be implemented with all types of small to large networks. Finally, the paper validates the idea through test bed simulation and compares the findings with other well-known existing techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aditya, V., Saxena, A.S.: Conceiving a intrusion detection system in the network by mobile agent. International Journal of Computer Science and Communication 2(2), 497–499 (2011)
Uddin, M., Khowaja, K., Rehman, A.A.: Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents. International Journal of Network Security & Its Applications (IJNSA) 2(4) (October 2010)
Janakiraman, S., Vasudevan, V.: ACO based Distributed Intrusion Detection System. International Journal of Digital Content Technology and its Applications 3(1) (March 2009)
Boughaci, D., Drias, H., Dendib, A., Bouznit, Y., Benhauou, B.: Distributed intrusion detection framework based on autonomous and mobile agents. IEEE International Conference on Dependability of Computer Systems, 248–255 (May 2006)
Mikro, T.: DHCP Client and Server. document revision 2.7, V2.9 (2005)
Ye, D., Bai, Q., Zhang, M.: P2P Distributed Intrusion Detections by using Mobile Agents. In: 7th IEEE/ACIS International Conference on Computer and Information Science, pp. 259–265. IEEE Press (2008)
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical Report, J.P. Anderson Company, Fort Washington, Pennsylvania (1980)
Overview of DHCP Snooping, Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide, Release 12.2SX (2010), http://www.docin.com/p-97571480.html
Sherri, D.: How to defend against rogue DHCP server malware, http://www.searchsecurity.techtarget.com
Boughau, D., Drias, H., Bendib, A., Bouznit, Y., Benhamou, B.: A Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents. In: IEEE International Conference on Dependability of Computer Systems (DEPCOS RELCOMEX 2006). IEEE Press (2006)
William, S.: Network security essentials: Applications and standards, 4th edn (2012)
Ballani, H., Francis, P.: Mitigating DNS DoS Attacks. In: ACM, CCS 2008. ACM Press, Alexandria (2008)
Ultr DNS DDoS Attack, http://blog.washingtonpost.com/securityfix/2006/05/
Rafeeq, Ur, Rehman.: Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache MySQL, PHP, and ACID, Technical report, Prentice Hall PTR Upper Saddle River, New Jersey 07458, Pearson Education, Inc. (2003)
Gandhi, M., Srivatsa, S.K.: Detecting and preventing attacks using network intrusion detection systems 2(1), 49–60 (2006)
Akamai DDoS Attack, Internet Security News, http://www.landfield.com/isn/mail-archive/2004/Jun/0088.html
Onashoga, S.A., Akinde, A.D., Sodiya, A.S.: A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems. Issues in Informing Science and Information Technology 6 (2009)
Ashoor, A.S., Gore, S.: Intrusion Detection System (IDS): Case Study. IPCSIT 15 (2011)
Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated discovery of concise predictive rules for intrusion detection. Journal of Systems and Software 60(3), 165–175 (2002)
Park, H., Lee, H.: On the effectiveness of probabilistic packet marking for IP trace back under denial of service attack. In: IEEE INFOCOM. IEEE Press, Anchorage (2001)
Kaushik, S.S., Deshmukh, P.R.: Detection of Attacks in an Intrusion Detection System. International Journal of Computer Science and Information Technologies (IJCSIT) 2(3) (2011), ISSN: 0975-9646
Yang, Y., Kamel, M.S.: An aggregated clustering approach using multi-ant colonies algorithms. The Journal of the Pattern Recognition Society 39, 1278–1289 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Razaque, A., Elleithy, K. (2012). Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-30567-2_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30566-5
Online ISBN: 978-3-642-30567-2
eBook Packages: Computer ScienceComputer Science (R0)