Skip to main content

Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 294))

Included in the following conference series:

Abstract

The paper highlights the problems of rogue dynamic host configuration protocol (DHCP) server that affects and disrupts network resources during communication. The rogue DHCP is unauthorized server that releases incorrect IP address to legal users and sniffs their traffic illegally. The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms and addition of new rules in existing IDS. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention. The work is particularly done to restore the privacy of users over MCL but can be implemented with all types of small to large networks. Finally, the paper validates the idea through test bed simulation and compares the findings with other well-known existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aditya, V., Saxena, A.S.: Conceiving a intrusion detection system in the network by mobile agent. International Journal of Computer Science and Communication 2(2), 497–499 (2011)

    Google Scholar 

  2. Uddin, M., Khowaja, K., Rehman, A.A.: Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents. International Journal of Network Security & Its Applications (IJNSA) 2(4) (October 2010)

    Google Scholar 

  3. Janakiraman, S., Vasudevan, V.: ACO based Distributed Intrusion Detection System. International Journal of Digital Content Technology and its Applications 3(1) (March 2009)

    Google Scholar 

  4. Boughaci, D., Drias, H., Dendib, A., Bouznit, Y., Benhauou, B.: Distributed intrusion detection framework based on autonomous and mobile agents. IEEE International Conference on Dependability of Computer Systems, 248–255 (May 2006)

    Google Scholar 

  5. Mikro, T.: DHCP Client and Server. document revision 2.7, V2.9 (2005)

    Google Scholar 

  6. Ye, D., Bai, Q., Zhang, M.: P2P Distributed Intrusion Detections by using Mobile Agents. In: 7th IEEE/ACIS International Conference on Computer and Information Science, pp. 259–265. IEEE Press (2008)

    Google Scholar 

  7. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical Report, J.P. Anderson Company, Fort Washington, Pennsylvania (1980)

    Google Scholar 

  8. Overview of DHCP Snooping, Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide, Release 12.2SX (2010), http://www.docin.com/p-97571480.html

  9. Sherri, D.: How to defend against rogue DHCP server malware, http://www.searchsecurity.techtarget.com

  10. Boughau, D., Drias, H., Bendib, A., Bouznit, Y., Benhamou, B.: A Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents. In: IEEE International Conference on Dependability of Computer Systems (DEPCOS RELCOMEX 2006). IEEE Press (2006)

    Google Scholar 

  11. William, S.: Network security essentials: Applications and standards, 4th edn (2012)

    Google Scholar 

  12. Ballani, H., Francis, P.: Mitigating DNS DoS Attacks. In: ACM, CCS 2008. ACM Press, Alexandria (2008)

    Google Scholar 

  13. Ultr DNS DDoS Attack, http://blog.washingtonpost.com/securityfix/2006/05/

  14. Rafeeq, Ur, Rehman.: Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache MySQL, PHP, and ACID, Technical report, Prentice Hall PTR Upper Saddle River, New Jersey 07458, Pearson Education, Inc. (2003)

    Google Scholar 

  15. Gandhi, M., Srivatsa, S.K.: Detecting and preventing attacks using network intrusion detection systems 2(1), 49–60 (2006)

    Google Scholar 

  16. Akamai DDoS Attack, Internet Security News, http://www.landfield.com/isn/mail-archive/2004/Jun/0088.html

  17. Onashoga, S.A., Akinde, A.D., Sodiya, A.S.: A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems. Issues in Informing Science and Information Technology 6 (2009)

    Google Scholar 

  18. Ashoor, A.S., Gore, S.: Intrusion Detection System (IDS): Case Study. IPCSIT 15 (2011)

    Google Scholar 

  19. Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated discovery of concise predictive rules for intrusion detection. Journal of Systems and Software 60(3), 165–175 (2002)

    Article  Google Scholar 

  20. Park, H., Lee, H.: On the effectiveness of probabilistic packet marking for IP trace back under denial of service attack. In: IEEE INFOCOM. IEEE Press, Anchorage (2001)

    Google Scholar 

  21. Kaushik, S.S., Deshmukh, P.R.: Detection of Attacks in an Intrusion Detection System. International Journal of Computer Science and Information Technologies (IJCSIT) 2(3) (2011), ISSN: 0975-9646

    Google Scholar 

  22. Yang, Y., Kamel, M.S.: An aggregated clustering approach using multi-ant colonies algorithms. The Journal of the Pattern Recognition Society 39, 1278–1289 (2006)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Razaque, A., Elleithy, K. (2012). Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30567-2_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30566-5

  • Online ISBN: 978-3-642-30567-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics