Intrusion Detection for Black Hole and Gray Hole in MANETs

被引:3
|
作者
She, Chundong [1 ]
Yi, Ping [2 ]
Wang, Junfeng [3 ]
Yang, Hongshen [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[3] Sichuan Univ, Coll Comp Sci, Chengdu 610064, Peoples R China
[4] Tongling Univ, Dept Elect Engn, Tongling 244000, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile Ad Hoc Networks; Black Hole; Gray Hole; Cross Layer Design; Intrusion Detection;
D O I
10.3837/tiis.2013.07.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.
引用
收藏
页码:1721 / 1736
页数:16
相关论文
共 50 条
  • [1] SAODV: Black Hole and Gray Hole Attack Detection Protocol in MANETs
    Dhende, Sandeep
    Musale, Sandeep
    Shirbahadurkar, Suresh
    Najan, Anand
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2391 - 2394
  • [2] Gray Hole Attack Detection in MANETs
    Patil, Sarika U.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 20 - 26
  • [3] IMPROVED MCBDS FOR DEFENDING AGAINST GRAY HOLE AND BLACK HOLE ATTACKS IN MANETS
    Haghighi, Ahmad
    Mizanian, Kiarash
    [J]. ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2016, 10 (30): : 1 - 8
  • [4] A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs
    Zardari, Zulfigar Ali
    He, Jingsha
    Zhu, Nafei
    Mohammadani, Khalid Hussain
    Pathan, Muhammad Salman
    Hussain, Muhammad Iftikhar
    Memon, Muhammad Qasim
    [J]. FUTURE INTERNET, 2019, 11 (03):
  • [5] Hybrid Detection of Black hole and Gray hole attacks in MANET
    Rathiga, P.
    Sathappan, S.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 135 - 140
  • [6] Dynamic Cluster Head Selection to Detect Gray Hole Attack using Intrusion Detection System in MANETs
    Funde, Rahul
    Chandre, Pankaj
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 73 - 77
  • [7] A Novel Approch For Gray hole And Black hole Detection And Prevention
    Dixit, Sweta
    Pathak, Priya
    Gupta, Sandeep
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [8] Cross centric intrusion detection system for secure routing over black hole attacks in MANETs
    Rajendran, N.
    Jawahar, P. K.
    Priyadarshini, R.
    [J]. COMPUTER COMMUNICATIONS, 2019, 148 : 129 - 135
  • [9] Gray and Black Hole Attack Identification using Control Packets in MANETs
    Dhaka, Arvind
    Nandal, Amita
    Dhaka, Raghuveer S.
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 83 - 91
  • [10] Detection As Well As Removal Of Black hole And Gray hole Attack In MANET
    Sharma, Neha
    Bisen, Anand Singh
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3736 - 3739