Journal of Computing and Natural Science


Intrusion Detection Scheme in Secure Zone Based System



Journal of Computing and Natural Science

Received On : 22 October 2020

Revised On : 28 November 2020

Accepted On : 29 December 2020

Published On : 05 January 2021

Volume 01, Issue 01

Pages : 019-025


Abstract


Mobile Ad hoc Networks (MANETs) are short lived networks that are greatly utilized in many applications such as special outdoor events, for communications in regions having no wireless infrastructure as in natural disasters, military operations, mine site operations and urgent business meetings. The self-organizing properties of its nodes forming the network are rapidly deployable and possess no infrastructure. Hence securing MANETs is a primary concern due to the absence of a central infrastructure and node mobility for which Intrusion Detection System (IDS) has been adopted in addition to the primary lines of defence such as cryptography and authentication. A Hierarchical IDS, namely, the Zone based IDS, functions in MANETs based on node collaboration and detects network layer intrusions with better accuracy. The proposed Cross Layer Detection in cohesion with anomaly detection technique of Zone based IDS aids in detecting attacks originating from the deeper layers of protocol stack, namely, physical and MAC layer thus providing better monitoring and improving the detection accuracy in Zone based IDS. The simulation results showcase an effective increase in detection rates and reduced false positives.


Keywords


MANET, IDS, Zone based IDS, Physical layer, MAC layer, network layer, Cross layer intrusion detection, detection rate, false positive rate, trust.


  1. B. Bains and R. Vaid, “Selective Forwarding based Intrusion Detection System for Secure Wireless Sensor Network,” International Journal of Computer Applications, vol. 77, no. 13, pp. 20–26, Sep. 2013.
  2. G. ZHOU and A. Shrestha, “Efficient Intrusion Detection Scheme based on SVM,” Journal of Networks, vol. 8, no. 9, Sep. 2013.
  3. N. W. Boskany, “Design of Alarm Based Network Intrusion Detection System,” Journal of Zankoy Sulaimani - Part A, vol. 16, no. 2, pp. 65–69, Apr. 2014.
  4. K. V. and S. C. Lingareddy, “A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks,” International Journal of Computer Applications, vol. 179, no. 1, pp. 1–8, Dec. 2017.
  5. G. Suseendran and A. Sasikumar, “Secure Intrusion-Detection System in Mobile Adhoc Networks,” Indian Journal of Science and Technology, vol. 9, no. 19, May 2016.
  6. Krishnaveni and M. Ezhilarasi, “Robust intrusion detection system based on fuzzy C means clustering scheme implemented in IoT-based wireless sensor networks,” International Journal of Networking and Virtual Organisations, vol. 23, no. 4, p. 312, 2020.
  7. S. Kamalesh and P. G. Kumar, “Fuzzy Based Secure Intrusion Detection System for Authentication in Wireless Sensor Networks,” Journal of Computational and Theoretical Nanoscience, vol. 14, no. 5, pp. 2465–2472, May 2017.
  8. R. K. Sharma, H. K. Kalita, and B. Issac, “Are machine learning based intrusion detection system always secure? An insight into tampered learning,” Journal of Intelligent & Fuzzy Systems, vol. 35, no. 3, pp. 3635–3651, Oct. 2018.
  9. M. Maheswari and R. A. Karthika, “A Novel QoS Based Secure Unequal Clustering Protocol with Intrusion Detection System in Wireless Sensor Networks,” Wireless Personal Communications, vol. 118, no. 2, pp. 1535–1557.
  10. R. Bala Krishnan and N. R. Raajan, “An Enhanced Biometric Based Intrusion Detection System For Secure Communication,” Far East Journal of Electronics and Communications, pp. 121–131, Apr. 2016.
  11. M. P. Arthur and K. Kannan, “Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks,” Wireless Networks, vol. 22, no. 3, pp. 1035–1059, Oct. 2015.
  12. S. Ponomarev and T. Atkison, “Industrial Control System Network Intrusion Detection by Telemetry Analysis,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 252–260, Mar. 2016.
  13. T. A., “Hybrid Cuckoo Search Optimization based Tuning Scheme for Deep Neural Network for Intrusion Detection Systems in Cloud Environment,” Journal of Research on the Lepidoptera, vol. 51, no. 2, pp. 209–224, Apr. 2020.
  14. R. Mitchell and I.-R. Chen, “Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 16–30, Jan. 2015.

Acknowledgements


Author(s) thanks to Dr.Nicoleta Dascalu for this research completion and Data validation support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Susan Bandecchi and Nicoleta Dascalu, “Intrusion Detection Scheme in Secure Zone Based System”, Journal of Computing and Natural Science, vol.1, no.1, pp. 019-025, January 2021. doi: 10.53759/181X/JCNS202101005.


Copyright


© 2021 Susan Bandecchi and Nicoleta Dascalu. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.