You are on page 1of 14

1.

Introduction
An Adhoc network is a collection of nodes that are capable to form dynamically a

temporary network without the support of any centralized fixed infrastructure. Two important properties of an Adhoc network are that it is self-organized and adaptive. The absence of a fixed infrastructure requires mobile hosts in MANETs to cooperate with each other for message transmissions. To form such a cooperative self-configurable environment, every mobile node is supposed to be a friendly node and is willing to relay messages for others to their ultimate destinations. Global trustworthiness in all network nodes is the main fundamental security assumption in MANETs. Adhoc wireless networks inherited the traditional problem of wireless and mobile communication, such as band width optimization, power control and transmission quality enhancement [1]. In addition topology is highly dynamic & random & very hard to predict. Physical security is limited. Detecting malicious nodes in Adhoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. The major issues irrespective of traditional wireless system, are given as Highly Dynamic Topology Routing in Mobile Adhoc Network Security in Mobile Adhoc Network IP Configuration in Mobile Adhoc Network Battery Backup Problem

Intrusion detection is a security technology that attempts to identify individuals who are trying to break into and misuse a system without authorization and those who have legitimate access to the system but are abusing their privileges [2]. The system protected is used to denote an information system being monitored by an intrusion detection system. It can be a host or network equipment, such as a server, a firewall, a router, or a corporate network, etc [3]. In MANETs, intrusion prevention and intrusion detection techniques need to complement each other to guarantee a highly secure environment. They play different roles in different status of the network. Intrusion prevention measures, such as encryption and authentication, are more useful in preventing outside attacks. Once the
1

node is compromised, however, intrusion prevention measures will have little effect in protecting the network. Therefore, Intrusion Detection Systems (IDSs), serving as the second line of defence for Adhoc Network.

2.

Motivation
Research on IDSs began with a report by Anderson [4] followed by Dennings

seminal paper [5], which lays the foundation for most of the current intrusion detection prototypes. Since then, many research efforts have been devoted to wired network IDSs. Numerous detection techniques and architecture for host machines and wired networks have been proposed. A good taxonomy of wired IDSs is presented in [3]. Mobile Adhoc Network IDS is categorized as Incentive Based approaches and Reputation based approach. And reputation based approaches are punishing the intruder nodes whereas incentive based approach foster the positive behaviour of the node. A lot of research work is done in each phase but no one is perfect and able to provide the complete solutions for MANET IDS. For Incentive based approaches models and algorithms are proposed by Zhang et al. [6], Huang et. Al [7], Bhargava and Agrawal [8], Bal Krishnan [9], Razak et. Al [10] Abusalah et. Al [11] Pirzada et. Al [12], Yan et. Al [13], Eschenauer et. Al [14], Mahmoud et. Al [15], Ping Y. et. Al [16], Komninos N. [17], & Ramachandran , C. et. Al [18]. All of them provided very good solution but each one has its own limitations like model is limited only for misuse detection, rules are very brief, model is routing protocols dependent, most of them are conceptual model and no statistics are considered, dependent on geography and mobility, centralized architecture is needed. Some models/ algorithms are not IDS but proposal for only reliable routing, and detect specific kind of attacks. For Reputation based schemes also lot of research work is done, including Song et. Al [19], Yan et. Al [20], Mundinger J. et. Al [21], Subhadrabandhu, D. et. Al [22], Perich, F. et. Al [23], Haiyun Luo et Al. [24], Madhavi et. Al [25], Rebahi, Y. et Al. [26]. Each scheme has its own advantages and disadvantages also. Most of them are based on Watchdog mechanism but it is helpful when we have one or two compromised node in the network. If number increased more than that then this schemes fails and also reputation based scheme punishes the node and boycott it for further communication. Adhoc environment is based on friendly atmosphere and chances of false positive are

very high and if we are punishing the node forever then network will be destroyed automatically. So for this research we will use incentive based schemes and try to resolve the limitation imposed by the previous research and identified certain Rules of Thumb for preceding the work further.

2.1

Rules of Thumb for Intrusion Detection System in Adhoc

Environment
1. 2. 3. 4. 5. 6. It should be Platform Independent & Geographical independent. No Restriction over mobility while designing and during deployment of IDS. IDS for MANET should not be Routing Protocol dependent. It should be Light Weighted and Fast Responsive. Reduced False Alarm and high number of True Positive. No overhead while number of nodes increases (It should be easy to adapt scalability). 7. Not only to prevent specific kind of attacks and allows the attack which are not defined in definitions of attacks. 8. 9. 10. Suitable Deployment of IDS in layered Architecture. A node should not be declared permanently as an Intruder. Never rely on decision of single node, Fair Voting mechanism should be there while declaring a node as intruder.

3.

Statement of the Problem


It is very challenging to design an intrusion detection system for mobile ad-hoc net-

works. The lack of fixed infrastructures and monitoring points make it difficult to collect audit data for the entire network. MANETs scared resources should be considered while designing the IDS framework. In MANET it is more difficult to distinguish between false alarms and real intrusions. Main objective of the research is to design the Intrusion Detection Framework for Intrusion Detection System in mobile Adhoc environment. This problem can be divided into following sub problems.

3.1

To Design Light Weighted Intrusion Detection Framework For Mobile Adhoc Environment.

3.2 3.3

To Construct Detection Engine Based On The Statistical Security Features To Evaluate The Performance Of The MANET Intrusion Detection System & Validate The Work.

4.

Description of the Research work


a. Problem Definition The first question in intrusion detection research is what statistical features of interest

should be used to construct the model. In the history, short sequences of system calls used by privileged processes can be used to effectively distinguish normal and intrusive behaviour and utilized to construct host based IDSs. Tcpdump data may be used to construct detection engine for attacks possible using TCP Segment Header. However Adhoc Network is in its premature stage and no application is designed to use the services of TCP protocol till date. But, likely to be designed in future and most probable solution for Attacks using TCP Segment is described and important Friend Features are used to detect the Intruder and normal node. Model File is generated which could be used for predicting the behaviour of the node. By collecting the statistical features of interest based on the experimental results, to identify the malicious and normal node for Denial of Service attack, Black Hole Attack

and worm hole attacks for Network Layer, attacks are not limited there subcategory included packet drops, delay in packet transmission, cache poisoning and selfishness. The performance of the system is obtained with and without attacks and describes that if there is only one malicious node then how much extent it can disturb the network. Except the TCP segment header based attack rest of the simulation will be carried out in approximately real scenario, as we know that the main contribution of the Adhoc network is towards the military application hence in maximum cases number of nodes may be limited thats why we take only 21 nodes and there speed will vary from (0-20) m/sec which is logically acceptable and trajectory they will follow a random trajectory likely to be similar to the real environment. However research is not limiting to the scalability or number of malicious or trusted node. In this research we have applied only one malicious node and collected the statistics for that node. If number of malicious nodes will increase then it has no impact on research because in this designing of detection system, whatever the number of trusted or malicious node present in the network. b. Research Methodology

After extensive research and analysis, we have decided to take Opnet Modeler for running the simulation for different kind of attacks and measuring the performance with and without attack, then data generated by the simulation is collected and features are identified for attacks and rule set are designed then for training and testing the data set SVM
LIGHT

is used, which is best among the ANN and other mining tools [27], [28],

[29], [30], [31], & [32]. Hence for Network Simulation Opnet Modeler (Version 14.0 and above) For classification and Prediction (Data Mining Tools) SVMLIGHT; used binary classification.

5.

Proposed Contents of the Thesis


It is very difficult to design a once-for-all intrusion detection system. Instead an

incremental enhancement strategy may be more feasible. A secure protocol should at least include mechanisms against known attack types. In addition, it should provide a scheme to easily add new security features in the future. The general methodology is: we first identify the attacks possible in Adhoc Environment then develop framework to facilitate the cooperation of IDS and design of detection engines using statistics
5

collected for known attack types. The whole dissertation is organized as follows. Chapter II, summarizes the related work which has been done in wired and wireless intrusion detection systems. We further introduce a few important existing prototypes and detection algorithms for Mobile Adhoc Networks, and demonstrate that very few research efforts have been devoted to MANET IDSs. On behalf of the literature review we identify Research Gap and rules of thumb for Adhoc Network. Note that the research described in this dissertation only focuses on the detection part, although intrusion response component is necessary in the system. In Chapter III, we proposed the prototype model which we will use for further Intrusion Detection System; In this we divided the model in two modules Local IDS and Global IDS, local ids will work on the data collected from the network and identify the friend list for first phase, these friend list are again tested in Global IDS module for rigorous checking, before declaring a node as friend or intruder Gids will use the voting mechanism. In this chapter we will discuss the tools used for simulation to extract the features and statistics to design the detection engine. In Chapter IV, attacks applied to the network using TCP segment header and collect the result to design the detection engine for Transport layer, training and testing of data set to design the detection engine and to check the accuracy of the detection system. However, it is not necessary in this dissertation but it will provide the new directions in the field of security for Mobile Adhoc Network. In Chapter V, Denial of Service attack applied to the network layer of Adhoc Network, evidences are collected to design intrusion detection engine specifically to defend against Denial of Service attacks. Feature extraction and induction of rule sets from the statistics collected, and applied to design detection engine, support vector machine is used to check the accuracy of the detection engine. In Chapter VI, Black Hole and Worm Hole attacks are applied to the Adhoc Network. Evidences are collected, features are extracted and rules are inducted to design intrusion detection engine specifically to defend against Black Hole attacks for MANET Intrusion Detection System (IDS). Support Vector Machine is used for training and testing the data set and checking the accuracy of the model file generated which will be used to deploy for detection engine.

Chapter VII concluded this dissertation and lists important future work. Because not many research efforts have been devoted to MANET IDSs, this research only provides the initial effort in constructing a viable and statistical based MANET IDS.

6.

Conclusion
This research describes a Cooperative Friend Features based Intrusion Detection

System for mobile ad-hoc networks. It consists of the detailed description of the local IDS and the Global IDS based framework for the IDS. They complement each other to make complete intrusion detection system for MANETs. Because of the importance of routing protocols in MANETs, we implemented and carried out the simulation using Reactive based routing because it is best suited for Adhoc Environment but research can be carried out using proactive based routing also. Model is designed for MAC Layer as well as Network Layer based Intrusion detection system, but we implemented it only for Network Layer i.e. Anomaly based Intrusion detection system.

7.

References

[1] Chakrabarti, S.; Mishra, A.; , "QoS issues in ad hoc wireless networks," Communications Magazine, IEEE , vol.39, no.2, pp.142-148, Feb 2001, doi: 10.1109/35.900643 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=900643&isnumber=19494 [2] Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Grance, T.; Heberlein, L.T.; Ho, C.-L.; Levitt, K.N.; Mukherjee, B.; Mansur, D.L.; Pon, K.L.; Smaha, S.E.; , "A system for distributed intrusion detection," Compcon Spring '91. Digest of Papers , vol., no., pp.170176, 25 Feb-1 Mar 1991, doi: 10.1109/CMPCON.1991.128802

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=128802&isnumber=3600 [3] H. Debar, M. Dacier, and A.Wespi, A Revised Taxonomy for Intrusion Detection Systems, Annales of Telecommunications, vol. 55, pp. 361-378, 01July, 2000 Springer Paris ISSN- 0003-4347. doi: 10.1007/BF02994844 URL: http://www.springerlink.com/content/4xq65ng0l0801626/ [4] J. P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical Report, James P. Anderson Co., Fort Washington, PA, April, 1980.

[5] Denning, D.E.; , "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, , vol.SE-13, no.2, pp. 222- 232, Feb. 1987, doi: 10.1109/TSE.1987.232894 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1702202&isnumber=35884 [6] Yongguang Zhang and Wenke Lee. 2000. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom '00). ACM, New York, NY, USA, 275-283. DOI=10.1145/345910.345958. URL: http://doi.acm.org/10.1145/345910.345958 [7] Yi-an Huang and Wenke Lee. 2003. A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN '03). ACM, New York, NY, USA, 135-147. DOI=10.1145/986858.986877 URL: http://doi.acm.org/10.1145/986858.986877

[8] Bhargava, S.; Agrawal, D.P. , "Security enhancements in AODV protocol for wireless ad hoc networks ," Vehicular Technology Conference, 2001. VTC 2001 Fall. IEEE VTS 54th, vol.4, no., pp.2143-2147 vol.4, 2001, doi: 10.1109/VTC.2001.957123

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=957123&isnumber=20686 [9] Balakrishnan, K.; Jing Deng; Varshney, V.K.; , "TWOACK: preventing selfishness in mobile ad hoc networks," Wireless Communications and Networking Conference, 2005 IEEE , vol.4, no., pp. 21372142 Vol. 4, 13-17 March, 2005, doi:

10.1109/WCNC.2005.1424848 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1424848&isnumber=30731 [10] Razak, S.A., Furnell, S., Clarke, N. Brooke, P. Mehrotra, Sharad. Zeng, Daniel, Chen,

Hsinchun. Thuraisingham, Bhavani. A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks--A Friend Approach, Lecture Notes In Computer Science, volume 3975, pp. 590-595, 2006, Springer Berlin / Heidelberg. doi: 10.1007/11760146_62 URL: http://dx.doi.org/10.1007/11760146_62 [11] Abusalah, L.; Khokhar, A.; Guizani, M.; , "NIS01-4: Trust Aware Routing in Mobile Ad Hoc Networks," Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE, vol., no., pp.1-5, Nov. 27 Dec.1, 2006, doi:10.1109/GLOCOM.2006.264; URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4150894&isnumber=4150630

[12]

Pirzada, A. A and McDonald, C. Establishing Trust in Pure Ad-Hoc Networks. In

Proceedings of the 27th Australasian Computer Science Conference (ACSC04), Dunedin, New Zealand, vol 26, pp. 47-54, 2004. URL: http://portal.acm.org/citation.cfm?id=979929 [13] Yan, Z., Zhang, P. and Virtanen, T. "Trust Evaluation Based Security Solution in Ad Hoc Networks". In Proceedings of the 7th Nordic Workshop on Secure IT Systems, NordSec 2003, Gjovik, Norway, pp. 1-14. URL:

http://www.citmo.net/library/Trust_Evaluation_Based_Security_Solution_in_Ad_Hoc_Netw orks.pdf [14] Eschenauer, L. On Trust Establishment in Mobile Ad-Hoc Networks, Lecture Notes in Computer Science, Volume: 2845, Year 2004, Springer Berlin / Heidelberg. Isbn: 978-3540-20830-3, Doi: 10.1007/978-3-540-39871-4_6 URL: http://dx.doi.org/10.1007/978-3-540-39871-4_6 URL:http://www.springerlink.com/content/97ge3hn0k6crcdht/ [15] Mahmoud, M.; Shen, X.; , "FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multi-hop Cellular Networks,", IEEE Transactions on Mobile Computing, vol. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5765975&isnumber=4358975 [16]Yi Ping, Zou Futai, Jiang Xinghao, Li Jianhua, Multi-agent cooperative intrusion response in mobile adhoc networks, Journal of Systems Engineering and Electronics, Volume 18, Issue 4, December 2007, Pages 785-794, ISSN 1004-4132, 10.1016/S1004-4132(08)600213. URL: http://www.sciencedirect.com/science/article/pii/S1004413208600213 [17] Nikos Komninos, Dimitris Vergados, Christos Douligeris, Detecting unauthorized and compromised nodes in mobile ad hoc networks, Ad Hoc Networks, Volume 5, Issue 3, April 2007, Pages 289-298, ISSN 1570-8705, 10.1016/j.adhoc.2005.11.005. URL: http://www.sciencedirect.com/science/article/pii/S1570870505001113 PP, no.99, pp.1, 0, doi: 10.1109/TMC.2011.92

[18] Chandrasekar Ramachandran, Sudip Misra, Mohammad S. Obaidat, FORK: A novel twopronged strategy for an agent-based intrusion detection scheme in ad-hoc networks, Computer Communications, Volume 31, Issue 16, 25 October 2008, Pages 3855-3869, ISSN 0140-3664, 10.1016/j.comcom.2008.04.012. 9

URL: http://www.sciencedirect.com/science/article/pii/S0140366408002314 [19] Chengqi Song, Qian Zang, OHM- Suppressing selfish behavior in adhoc networks with one more hop 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 2008, ISBN:978-963-9799-26-4. URL: http://dl.acm.org/citation.cfm?id=1741551 [20] Yan, Z., Zhang, P. and Virtanen, T. "Trust Evaluation Based Security Solution in Ad Hoc Networks". In Proceedings of the 7th Nordic Workshop on Secure IT Systems, NordSec 2003, Gjovik, Norway, pp. 1-14. URL:

http://www.citmo.net/library/Trust_Evaluation_Based_Security_Solution_in_Ad_Hoc_Netw orks.pdf [21] Jochen Mundinger, Jean-Yves Le Boudec, Analysis of a reputation system for Mobile AdHoc Networks with liars, Performance Evaluation, Volume 65, Issues 3-4, March 2008, Pages 212-226, ISSN 0166-5316, 10.1016/j.peva.2007.05.004. URL: http://www.sciencedirect.com/science/article/pii/S016653160700048X [22] Subhadrabandhu, D.; Sarkar, S.; Anjum, F.; , "A framework for misuse detection in ad hoc Networks-part I," Selected Areas in Communications, IEEE Journal on , vol.24, no.2, pp. 274289, Feb. 2006, doi: 10.1109/JSAC.2005.861387

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1589108&isnumber=33490 [23]Perich, F.; Undercoffer, J.; Kagal, L.; Joshi, A.; Finin, T.; Yesha, Y.; , "In reputation we believe: query processing in mobile ad-hoc networks," Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on , vol., no., pp. 326334, 22-26 Aug. 2004, doi:

10.1109/MOBIQ.2004.1331739 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1331739&isnumber=29413 [24] Haiyun Luo; Jiejun Kong; Petros, Z.; Songwu Lu; Lixia Zhang; , "Providing robust and

ubiquitous security support for mobile ad-hoc networks," Network Protocols, 2001. Ninth International Conference on 10.1109/ICNP.2001.992905 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=992905&isnumber=21404 [25] Madhavi, S.; , "An Intrusion Detection System in Mobile AdHoc Networks," International Conference on Information Security and Assurance, 2008. ISA 2008., vol., no., pp.7-14, 2426 April 2008, doi: 10.1109/ISA.2008.80 , vol., no., pp.251-260, 14-14 Nov. 2001, doi:

10

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4511525&isnumber=4511515 [26] Rebahi, Y.; Mujica-V, V.E.; Sisalem, D.; , "A reputation-based trust mechanism for ad hoc networks," 10th IEEE Symposium on Computers and Communications, 2005. ISCC 2005. Proceedings. , pp. 3742, 27-30 June 2005, doi: 10.1109/ISCC.2005.17

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1493704&isnumber=32117 [27] Andrew H. Sung, Srinivas Mukkamala, Feature Selection for Intrusion Detection using

Neural Networks and Support Vector Machines, Transport Research Record published by TRB Journal 2003,Issue number 1822, ISSN: 0361-1981, pp 33-39. URL:

http://dx.doi.org/10.3141/1822-05 [28] Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Intrusion detection using an

ensemble of intelligent paradigms, Journal of Network and Computer Applications, Volume 28, Issue 2, April 2005, Pages 167-182, ISSN 1084-8045, 10.1016/j.jnca.2004.01.003. (http://www.sciencedirect.com/science/article/pii/S1084804504000049) [29] L.V. Ganyun, Cheng Haozhong, Zhai Haibao, Dong Lixin, Fault diagnosis of power

transformer based on multi-layer SVM classifier, Electric Power Systems Research, Volume 74, Issue 1, April 2005, Pages 1-7, ISSN 0378-7796, 10.1016/j.epsr.2004.07.008. (http://www.sciencedirect.com/science/article/pii/S0378779604001944) [30] Emre omak, Ahmet Arslan, brahim Trkolu, A decision support system based on

support vector machines for diagnosis of the heart valve diseases, Computers in Biology and Medicine, Volume 37, Issue 1, January 2007, Pages 21-27, ISSN 0010-4825, 10.1016/j.compbiomed.2005.11.002. (http://www.sciencedirect.com/science/article/pii/S0010482505001484) [31] Shang-Ming Zhou; Gan, J.Q.; , "Constructing L2-SVM-Based Fuzzy Classifiers in

High-Dimensional Space With Automatic Model Selection and Fuzzy Rule Ranking," Fuzzy Systems, IEEE Transactions on , vol.15, no.3, pp.398-409, June 2007, doi:

10.1109/TFUZZ.2006.882464 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4231867&isnumber=4231848

[32]

Jung-Hsien Chiang; Pei-Yi Hao; , "Support vector learning mechanism for fuzzy rule-

based modeling: a new approach," Fuzzy Systems, IEEE Transactions on , vol.12, no.1, pp. 112, Feb. 2004, doi: 10.1109/TFUZZ.2003.817839

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1266382&isnumber=28327 11

8.

List of Publication Based on Research Work Journals:

[1]

Husain Shahnawaz, Gupta S.C., "Friend Features Extraction to Design Detection

Engine for Intrusion Detection System in Mobile Adhoc Network", Communicated in International Journal of Computer Science & Information Technology, ISSN 09759646, Vol (2) Issue 4, 2011, indexed in Google Scholor, Open J Gate, Cabell Publishing, Index Copernicus. U.R.L http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020440.pdf Citation Rate: Cited by 2 [2] Husain S.; Gupta, S.C.; , Black Hole Attack in AODV & Friend Features

Extraction to Design Detection Engine for Intrusion Detection System in Mobile Adhoc Network, accepted for publication in Journal of Engineering Science and Technology (JESTEC) in vol. 7 issue 5 October 2012, an open access peer reviewed journal ; ISSN : 1823-4690. Indexed in Scopus. URL: http://jestec.taylors.edu.my/

International Conferences:
[1] Husain, S.; Gupta, S.C.; , "A proposed model for Intrusion Detection System for

mobile adhoc network," Computer and Communication Technology (ICCCT), 2010 International Conference on , pp. 99-102, 17-19 Sept. 2010, doi:

10.1109/ICCCT.2010.5640420 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5640420&isnumber=5 640373 URL for Scopus: http://www.scopus.com/inward/record.url?eid=2-s2. 08650556940 &partnerID =40&md5=a87b99b547c8abd7a05d04e0407e875b Citation Rate: Cited by 3 [2]Husain Shahnawaz,; Gupta, S. C.;, "Denial of Service attack in AODV & friend features extraction to design detection engine for intrusion detection system in Mobile Adhoc Network," Computer and Communication Technology (ICCCT), 2011 2nd International Conference on , vol., no., pp.292-297, 15-17 Sept. 2011, doi: 10.1109/ICCCT.2011.6075162
12

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6075162&isnumber=6 075092 ScopusURL:http://www.scopus.com/inward/record.url?eid=2-s2.082955227957&partnerID=40&md5=56547f7563113d1108a2236767447afe


Citation Rate: cited by 1

Communicated:
[1] Husain S.; Gupta, S.C.; , Worm Hole Attack in AODV & Friend Features Extraction to Design Detection Engine for Intrusion Detection System in Mobile Adhoc Network, communicated in International Journal of Adhoc Network published by Elsevier, ISSN : 1570-8705.

Other papers Published: (Included in Introduction)


[1] Husain. Shahnawaz, S.C Gupta, A Fair Load Distribution with Greedy Booster Approach for MANET, presented in 3rd International Conference on Data Mining ICDM - 2010, hosted by IMT Ghaziabad, University of Saskatachewan, Canada, Nanyang Technological University, Singapore. Proc. published by Tata Mac Graw Hill Publisher. [2] Husain. Shahnawaz, S.C. Gupta, Ahmad Anzar, Simulation & Comparison of

TORA & DSR Routing Protocol in MANET, 6th National Conference on Information Technology & Energy Management organized by GLA Group of Institution, Mathura, India. [3] Ahmad Anzar, Husain Shahnawaz, Chand Mukesh, SC Gupta, , ASSR Fair

Load Distribution Using Efficiency Division Factor with Greedy Booster Approach for MANET, presented in International conference ICT-2010, & proceeding published with Springer CCIS. ISBN: 978-3-642-15766-0 (Indexed in ISI and DBLP), Doi: 10.1007/978-3-642-15766-0_112 URL: http://dx.doi.org/10.1007/978-3-642-15766-0_112 [4] Ahamd Anzar, Husain Shanawaz, S.C Gupta, A Mechanism for Booster

Approach in Mobile Ad Hoc Network, published in International Journal of Scientific & Engineering Research Volume 2, Issue 6, June-2011; ISSN 2229-5518. Indexed in Google Scholar, Ebsco, Scribd, DBLP, DOAJ, Scirate, Scirus, BASE, Citeseer, etc. URL:
13

http://www.ijser.org/onlineResearchPaperViewer.aspx?A_Mechanism_for_Booster_Ap proach_in_Mobile_Ad Hoc_Network.pdf [5] Husain. Shahnawaz, S.C.Gupta, Ahmad Anzaar, Simulation Study for

Performance Comparison of Routing Protocols In Mobile Adhoc Network, published in International Conference ICCSCN-2010 Singapore, published in issue 70, WASET (World Academy of Science Engineering & Technology) an open access International journal, eISSN 2010-3778. URL: http://www.waset.org/journals/waset/v70/v70-123.pdf

Shahnawaz Husain (Research Scholar) Reg. No.: GEU (RES)/0074 Enrolment No.: GE 09570007

Prof.(Retd.)S.C.Gupta (Research Guide)

14

You might also like