Skip to main content
Log in

An optimized intrusion response system for MANET:

An attack-severity aware approach

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile Ad-Hoc NETworks (MANETs) are highly vulnerable to various security threats due to the numerous constraints they present, such as the absence of a fixed infrastructure, the dynamic topology change, their dependence on cooperative communication, the limited resource constraints, the unreliability of wireless links, and most importantly the lack of a clear line of defence. In this paper, MANET security issues are addressed through a comprehensive analysis of some common security threats, mainly blackhole, grayhole and the selfish behaviour attack. This has led to the building of a new intrusion response system denoted MASID-R-SA. This system is capable of providing autonomic systematic responses based on the intrusions’ measured severity level. The main objective of this approach is to better survive both single and multiple intrusion scenarios while minimizing the negative consequences of adopting typical static responses. We demonstrate through simulations the effectiveness of the proposed intrusion response system in appropriately responding to both single and multiple intrusions. For instance, a true detection rate of 97,23% and an average of 96,33% response success rate are achieved. The study revealed, also, that the proposed system solves some critical issues related to network partitioning and remerging efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H (2002) An on demand secure routing protocol resilient to byzantine failures Proceedings of the first workshop on wireless security, wise’02, pp 21–30

    Google Scholar 

  2. Banerjee S, Majumder K (2012) A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In: Thampi S, Zomaya A, Strufe T, Alcaraz Calero J, Thomas T. (eds) Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science, vol 335. Springer, Berlin Heidelberg, pp 396–407

  3. Cheng BC, Tseng RY (2011) A context adaptive intrusion detection system for manet. ComputCommun 34:310–318

    Google Scholar 

  4. Fall K, Varadhan K (2010) The VINT Project: The ns Manual. http://www.isi.edu/nsnam/ns/ns-documentation

  5. Gupta A, Harsh S, Anil K (2010) A performance analysis of aodv, dsr & tora routing protocols. Int J Eng Tech 2:226–231

    Google Scholar 

  6. Indirani G, Selvakumar K (2012) Swarm based intrusion detection and defense technique for Malicious attacks in mobile ad hoc networks. Int J Comput Appl 50(19):1–7

    Google Scholar 

  7. Liao HJ, Richard CH, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24

    Article  Google Scholar 

  8. Mafra P, Fraga J, Santin A (2014) Algorithms for a distributed ids in manets. J Comput Syst Sci 80:554–570

    Article  MATH  Google Scholar 

  9. Malczewski J, Rinner C (2015) Multiattribute decision analysis methods. In: Malczewski J, Rinner C (eds) Multicriteria Decision Analysis in Geographic Information Science, Advances in Geographic Information Science. Springer, US, pp 81–121

    Google Scholar 

  10. Marchang N, Datta R (2008) Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw 06: 503–528

    Article  Google Scholar 

  11. Mechtri L, Djemili FT, Ghanemi S (2012) Masid: Multi-agent system for intrusion detection in MANET Proceedings of the 2012 ninth international conference on information technology - new generations, ITNG ’12. IEEE Computer Society, Washington, DC, USA, pp 65–70

    Chapter  Google Scholar 

  12. Mechtri L, Djemili FT, Ghanemi S, Magoni D (2015) An IDS -based Self-healing Approach for MANET Survival Proceedings of the international conference on intelligent information processing, security and advanced communication, IPAC ’15. ACM, New York, NY, USA, pp 1–5

    Google Scholar 

  13. Mechtri L, Djemili F, Ghanemi S (2015) Agents for intrusion detection in MANET: Survey and analysis. In: Awad W, Al-Bastaki Y, El-Alfy ES (eds) Improving Information Security Practices through Computational Intelligence, Advances in Information Security, Privacy, and Ethics, IGI Global, pp 127–147

  14. Nadeem A, Howarth M (2014) An intrusion detection and adaptive response mechanism for manets. Ad Hoc Netw 13:368–380

    Article  Google Scholar 

  15. Perkins C, Belding-Royer E, Das S (2003), Ad hoc on-demand distance vector (aodv) routing. http://www.ietf.org/rfc/rfc3561.txt

  16. Ping Y, Futai Z, Xianghao J, Jianhua L (2007) Multi-agent cooperative intrusion response in mobile ad hoc networks. J Syst Eng Electron 18:785–794

    Article  Google Scholar 

  17. Razak S, Furnell S, Clarke N, Brooke P (2008) Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw 6:1151–1167

    Article  Google Scholar 

  18. Seresht N, Azmi R (2014) Mais-ids: a distributed intrusion detection system using multi- agent AIS approach. Eng Appl Artif Intel 35:286–298

    Article  Google Scholar 

  19. Sharma P, Sharma N, Singh R (2012) A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network. Int J Comput Appl 41(21):16–21

    Google Scholar 

  20. Talooki V, Ziarati K (2006) Performance comparison of routing protocols for mobile ad hoc networks Proceedings of Asia-Pacific Conference on Communications, APCC ’06. doi:10.1109/APCC.2006.255924, pp 1–5

    Google Scholar 

  21. Usha and Bose (2012) Comparing the impact of black hole and gray hole attacks in mobile adhoc networks. J Comput Sci 8(11):1788–1802

    Article  Google Scholar 

  22. Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen XS, Du DZ (eds) Wireless Network Security, Signals and Communication Technology. Springer, US, pp 103–135

    Chapter  Google Scholar 

  23. Yang H, Shu J, Meng X, Lu S (2006) Scan: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leila Mechtri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mechtri, L., Tolba, F.D. & Ghanemi, S. An optimized intrusion response system for MANET:. Peer-to-Peer Netw. Appl. 11, 602–618 (2018). https://doi.org/10.1007/s12083-017-0573-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0573-5

Keywords

Navigation