Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks
Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks
Bharati Vidyapeeths Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks
A. Chaudhary1, V. N. Tiwari2 and A. Kumar3
Submitted in September, 2013; Accepted in February, 2014
Abstract Due to the advancement in wireless technologies, Manets characteristics, Prevention based techniques such as
many of new paradigms have opened for communications. authentication and encryption are not good solution for ad hoc
Among these technologies, mobile ad hoc networks play a networks to eliminate security threats because prevention based
prominent role for providing communication in many areas techniques cannot protect against mobile nodes which contain
because of its independent nature of predefined the private keys. So that Intrusion detection system is an
infrastructure. But in terms of security, these networks are essential part of security for MANETs. It is very effective for
more vulnerable than the conventional networks because detecting the intrusions and usually used to complement for
firewall and gateway based security mechanisms cannot be other security mechanism. Thats why Intrusion detection
applied on it. Thats why intrusion detection systems are used system (IDS) is known as the second wall of defense for any
as keystone in these networks. Many number of intrusion survivable network security [3]. There are some groups which
detection systems have been discovered to handle the works together to enhance the functioning of mobile ad hoc
uncertain activity in mobile ad hoc networks. This paper networks (MANETs). IETF constituted the mobile ad hoc
emphasized on proposed fuzzy based intrusion detection networks working group in 1997 [4].The rest of this paper is
systems in mobile ad hoc networks and presented their organized as follows: Section 2 presents the detailed
effectiveness to identify the intrusions. This paper also introduction of Intrusion detection system. Section 3 describes
examines the drawbacks of fuzzy based intrusion detection the need of fuzzy based IDS on MANETs and Section 4
systems and discussed the future directions in the field of discusses and analyzes the proposed fuzzy based IDSs in
MANETs from the literature. Section 5 discusses the
intrusion detection for mobile ad hoc networks.
drawbacks of proposed fuzzy based IDS and finally conclusion
Index Terms Detection Methods, Fuzzy Logic, Intrusion and direction for future research is outlined in section 6.
detection system (IDS), Intrusion Detection System
Architectures, Mobile Ad Hoc Networks (MANETs), Security 2.0 INTRUSION DETECTION SYSTEM
When any set of actions attempt to compromise with the
issues.
security attributes such as confidentiality, repudiation,
availability and integrity of resources then these actions are said
1.0 INTRODUCTION
Mobile ad hoc networks (MANETs) do not have any pre- to be the intrusions and detection of such intrusions is known as
existing infrastructure or administrative point as like intrusion detection system (IDS) [5]. The basic functionality of
conventional networks. In MANETs, mobile nodes can IDS depends only on three main modules such as data
communicate freely to each other without the need of collection, detection and response modules. The data collection
predefined infrastructure. This effectiveness and flexibility module is responsible for collecting data from various data
makes these types of networks attractive for many applications sources such as system audit data, network traffic data, etc.
such as military operations, rescue operations, neighborhood Detection module is responsible for analysis of collected data.
area networks, education applications and virtual conferences. While detecting intrusions if detection module detects any
Mobile nodes play the role of host as well as routers and also suspicious activity in the network then it initiates response by
support the multihop communication between the nodes. By the response module. There are three main detection techniques
the help of routing protocols, mobile nodes can send the data presented in the literature such as misuse based, anomaly based
packets to each other in mobile ad hoc networks. Some and specification based techniques. The first technique, misusecharacteristics of MANETs such as communication via based detection systems such as IDIOT [6] and STAT [7]
wireless links, resource constraints (bandwidth and battery detect the intrusions on the behalf of predefined attack
power), cooperativeness between the nodes and dynamic signature. The disadvantage of this technique is that it cannot
topology make it more vulnerable to attacks [1] [2]. Due to
detect new attacks but has low false positive rate so that it is
1,3
Dept. of Computer Science & Engineering, Manipal generally used by the commercial purpose based IDSs. Second
intrusion detection technique is anomaly-based detection
University, Jaipur (India)-302026
2
Dept. of Electronic & communication, Manipal University, technique e.g. IDES [8]. It detects the intrusion on bases of
normal behaviour of the system. Defining the normal behavior
Jaipur (India)-302026
1
of the system is a very challenging task because behavior of
E-Mail: [email protected],
2
system can be changed time to time. This technique can detect
[email protected] and
3
the new or unknown attacks but with high false positive rates.
[email protected],
The third technique is specification - based intrusion detection
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
690
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
691
Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks
(membership function) approach. For reaching the final FOU
(Foot print of uncertainty) they used interval type-2 fuzzy map
(IT2FM) of each selected parameter
IT2FM ( )
[0, 100]
Here x percent changes in the parameter fi is indicated the
uncertainty on the behalf of expert knowledge and some
indications are used for presenting the changes the parameters
such as red region for misbehavior of network parameter fi,
Yellow region for suspicious behavior and white region
indicate the normal behavior. Helper T - Cells measure the
actual changes of parameter fi and find the closer region (red,
yellow and white) of IT2FM. Once find the final decision then
helper T-cells send the signal to Killer T-Cells for particular
immune response. Actually, the proposed solution is totally
based on the binding process of receptors and antigens. On the
other hand, the proposed algorithm could moderate a static
artificial immune system because all information of the
parameters of the system should be available in advance. So
that building the correct type-2 fuzzy map could be inefficient.
That why for future work, they will concentrate on the
learning phase of the algorithm.
LRM
Sequence No.
Acknowledge.
Time
Fuzzy
Logic
Controller
Fuzzy
Logic
Controller
Fuzzifier
RREQ rate
Counter
measures
Load Pattern
Fuzzy
FuzzyLogic
LogicController
Controller
Online
threshold modifier
Database
Node
Alarm
Fuzzy
Fig.2. proposed
fuzzy logic basedVerification
IDS [17]
module
AODV
Module
Network
Traffic
Fuzzy
Parameter
extraction
Fuzzy
Computation
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
692
Data
extraction
Black hole
detection
Data
Clustering
Sugeno
FIS
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
693
Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks
techniques should be anomaly based or hybrid. Table 1
summarizes all fuzzy based IDSs in MANETs.
6.0 CONCLUSION AND FUTURE SCOPE
In this paper, we have analyzed fuzzy based intrusion detection
systems which have been proposed in literature for Manets. We
have analyzed the working style of proposed fuzzy based IDSs
and reached on decision that still we do not have any promising
solution for this dynamic environment because most of
Proposed fuzzy based IDSs emphasized on very limited
features for data collection towards detection of very specific
range of attacks. Hence, MANETs are required for more
concentration of researchers. It can be a fastest growing area
for future research in terms of detection techniques, response
mechanism and selection of node features for data collection.
In future, we are concentrating to develop a new intrusion
detection system that can be used to classify the normal and
malicious activities in the network.
REFERENCES
[1]. Y. Li and J. Wei., Guidelines on selecting intrusion
detection methods in MANET, In Proceedings of the
Information Systems Educators Conference, 2004.
[2]. A. Hasti, Study of Impact of Mobile Ad Hoc
Networking and its Future Applications, BIJIT 2012;
January - June, 2012; Vol. 4 No. 1; ISSN 0973 5658.
[3].
Y. Zhang and W. Lee., Intrusion detection in
wireless ad hoc networks , In Proceedings of the 6th
Annual International Conference on Mobile Computing
and Networking (MobiCom'00), pages 275-283, 2000.
[4].
IETF Mobile Ad-Hoc Networks Working Group
(MANET),
IETF
websitewww.ietf.org/dyn/wg/charter/manet-charter.html.
[5]. R. Heady, G. Luger, A. Maccabe, and M. Servilla, The
architecture of a network level intrusion detection
system Technical report, Computer Science
Department, University of New Mexico, August 1990.
[6]. S. Kumar and E. H. Spafford, A software architecture
to support misuse intrusion detection In Proceedings
of the 18th national Information Security Conference,
pages 194- 204, 1995.
[7]. K. Ilgun, R. A. Kemmerer, and P.A. Porras, State
transition Analysis: A rule- based intrusion detection
approach, IEEE Transactions on software Engineering,
Vol. 21 No. 3:181-199, March 1995.
[8]. T.Lunt, A. Tamaru, F. Gilham, R. Jagannathan,
P.Neumann, H. Javitz, A. Valdes, and T.Garvey, A
real- time intrusion detection expert system (IDES)
final technical report, Technical report, Computer
Science Laboratory, SRI International, Menlo Park,
Clifornia, February, 1992.
[9]. Uppuluri P, Sekar R, Experiences with Specificationbased Intrusion Detection, In Proc of the 4th Int Symp
on Recent Adv in Intrusion Detection , pp. 172-189.
2001.
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
694
IDS
Data
Source
IDS using
Fuzzy Sets
based Agent
communication
[16]
Collect
packet
data from
data
stream
Fuzzy Logic
Controller
based IDS [17]
LIDS
audit log
file and
neighbors
related
data
Artificial
Immune
System based
on Type-2
Fuzzy Sets for
Manets IDS
[18]
Collect
sample
data of
various
network
parameters
Energy based
trust solution
using fuzzy
logic for
IDS[19]
network
packet
level data
IDS
Architectures
Distributed &
cooperative
Detection
Techniques
Misuse based
detection
Distributed &
cooperative
Misuse based
detection
Distributed &
cooperative
PartialAnomaly
based
detection
Distributed
Anomaly
based
Detection
Routing
Protocol
Addressed
attack type
Decision
Making
not
specified
Distributed
denial of
service
attacks and
port
scanning
attacks
Independent
&
collaborative
AODV
False route
request
attack
collaborative
not
specified
Misbehaving
Nodes
collaborative
DSR
Selfish
nodes
Independent
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
Response
Mechanism
Simulator
& Toolbox
Alarm
SIFA
Application
Fuzzy
based
response
model on
attacked
system
NS-2 and
fuzzy logic
controller
toolbox of
MATLAB
6.1
Active
immune
based
response on
attacked
system
No detail
No detail
NS-2
695
Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks
IDS
Data
Source
IDS
Architectures
Fuzzy logic
based IDS [20]
Network
traffic
related
feature
Distributed
IDS using
Fuzzy
Logic[21]
Packet
related
feature
Trust and
fuzzy logic
based IDS[22]
Network
packet
data
Fuzzy
inference
system based
IDS[23]
Data
packets
and
control
packet
based
features
IDS using
Forensic
analysis based
on fuzzy logic
approach[24]
Data
packets
and
routing
packets
Mamdani and
Sugeno based
IDSs
[25][26][27]
Packet
based and
mobility
based data
Detection
Techniques
Routing
Protocol
Addressed
attack type
Decision
Making
Response
Mechanism
Misuse based
detection
AODV
Blackhole
Attack
Independent
Alarm
NS-2
Distributed
Misuse based
detection
AODV
Independent
Active
response
NS-2
Distributed &
cooperative
Cryptographic
algorithms
and trust
based
AODV
collaborative
alarm
Distributed
Specification
and anomaly
based
detection
Distributed
Distributed
Architecture
Misuse based
detection
Misuse based
And anomaly
based
AODV
DSR
AODV
Blackhole
Attack, Gray
hole Attack
Malicious
node
Blackhole
attack
Distributed
denial of
service
attacks
Packet
dropping
attack and
sleep
deprivation
attack
Independent
Active
response
based on
FIS system
output
Independent
not
specified
Independent
alarm
Simulator
& Toolbox
Qualnet 5.0
NS-2 and
MATLAB
Function
genfis
Qualnet
Simulator
6.1
Copy Right BIJIT 2014; January June, 2014; Vol. 6 No. 1; ISSN 0973 5658
696