Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

EAACK-A Secure Intrusion Detection System Overview


Published on

A Secure intrusion detection system that sends the electronic report

Published in: Engineering
  • Be the first to comment

EAACK-A Secure Intrusion Detection System Overview

  1. 1. EAACK—A Secure Intrusion- Detection System for MANETs Under the Guidance of, Mrs. N. Geetha Priya, AP/CSE, V.P.M.M Engineering College for Women. Presented By, Ms. N. Sonia(953512104073), Ms. R. Viji (953512104088), V.P.M.M Engineering College for Women. VPMMECW/CSE/24-02-2016
  4. 4. WIRELESS ADHOC NETWORK • A wireless network is a computer network that uses wireless data connections for connecting network nodes. • A wireless ad hoc network (WANET) is a decentralized type of wireless network. 1. Self-configuring, 2. Dynamic networks 3. Nodes are free to move. VPMMECW/CSE/24-02-2016
  5. 5. WIRELESS ADHOC NETWORK VPMMECW/CSE/24-02-2016 • Wireless ad-hoc networks can be classified by their application: Mobile ad hoc networks (MANETs). Vehicular ad hoc networks (VANETs). Smartphone ad hoc networks (SPANs).
  6. 6. MANETs • Mobile Adhoc NETworks. • Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other either directly or indirectly. • Because of MANET’s distributed architecture and changing topology, a traditional centralized monitoring technique is no longer feasible in MANETs. • In such case, it is crucial to develop an intrusion-detection system (IDS) VPMMECW/CSE/24-02-2016
  7. 7. INTRUSION DETECTION SYSTEM VPMMECW/CSE/24-02-2016 • An Intrusion Detection System (IDS) is a Software application that 1. Monitors network for malicious activities 2. Produces electronic reports to a management station.
  8. 8. • Network Intrusion Detection Systems Network Intrusion Detection Systems (NIDS) are placed within the network to monitor traffic to and from all devices . • Host Intrusion Detection Systems Host Intrusion Detection Systems (HIDS) run on individual hosts or devices on the network. VPMMECW/CSE/24-02-2016 INTRUSION DETECTION SYSTEM(Contd.)
  9. 9. OBJECTIVE VPMMECW/CSE/24-02-2016 • Implementation of IDS for MANETs using EAACK scheme. • Comparison of EAACK performance analysis with other contemporary approaches like ACK and TWOACK.
  10. 10. EXISTING SYSTEM VPMMECW/CSE/24-02-2016 • Watchdog detects malicious misbehaviour but fails at receiver collision. • The TWOACK scheme successfully solves the receiver collision but has network overhead. • AACK fail to detect malicious nodes with the presence of false misbehavior report
  11. 11. PROPOSED SYSTEM-ABSTRACT VPMMECW/CSE/24-02-2016 • Implemented a new intrusion-detection system named Enhanced Adaptive Acknowledgement(EAACK) specially designed for MANETs. • Our proposed approach EAACK is designed to tackle false misbehavior, limited transmission power, and receiver collision. • EAACK demonstrates higher malicious- behaviour - detection rate but does not greatly affect the Network Performances.
  12. 12. • EAACK is consisted of three major parts, namely, ACK, Secure ACK (S-ACK), and misbehavior report authentication(MRA). • ACK is basically an end-to-end acknowledgment scheme, aiming to reduce network overhead when no network misbehavior is detected. • In S-ACK mode, the three consecutive nodes work in a group to detect misbehaving nodes in the network. • The core of MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route. VPMMECW/CSE/24-02-2016 PROPOSED SYSTEM-ABSTRACT(Contd.)
  13. 13. A LITERATURE SURVEY ON T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008. VPMMECW/CSE/24-02-2016
  14. 14. CONFIDANT • CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks). • When a node experiences a misbehaving node, it will send a warning message to other nodes called as friends, based on trusted relationship. VPMMECW/CSE/24-02-2016
  15. 15. OCEAN VPMMECW/CSE/24-02-2016 • Bansal and Baker also proposed a DSR protocol called OCEAN (Observation-based Cooperation Enforcement in Adhoc Networks). • OCEAN also uses a monitoring system and a reputation system. • OCEAN relies only on its own observation to avoid the new vulnerability of false accusation from second-hand reputation exchanges. • OCEAN can be considered as a stand-alone architecture.
  16. 16. PROS & CONS PROS:  Node Co-operation.  Effective Data forwarding. CONS:  Network Overhead.  Low Performance. VPMMECW/CSE/24-02-2016
  17. 17. REFERENCES VPMMECW/CSE/24-02-2016 • K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009. • R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012 pp. 659–666. • R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541. • T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008. • L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007. • D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.
  18. 18. VPMMECW/CSE/24-02-2016
  19. 19. VPMMECW/CSE/24-02-2016