B. Messabih
Department of Computer science, University of Science and Technology Oran

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Anomaly detection using clustering for ad hoc networks -behavioral approach- Belacel Madani; B. Messabih
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile   ad   hoc   networks   (MANETs)   are   multi-hop   wireless   networks   ofautonomous  mobile  nodes  without  any  fixed  infrastructure.  In  MANETs,  it  isdifficult to detect malicious nodes because the network topology constantly changesdue  to  node  mobility.  Intrusion  detection  is  the  means  to  identify  the  intrusivebehaviors and provide useful information to intruded systems to respond fast and toavoid  or  reduce  damages.  The  anomaly  detection  algorithms  have  the  advantagebecause  they  can  detect  new  types  of  attacks  (zero-day  attacks).In  this  paper,  wepresent  a  Intrusion  Detection  System  clustering-based  (ID-Cluster)  that  fits  therequirement of MANET. This dissertation addresses both routing layer misbehaviorsissues,  with  main  focuses  on  thwarting  routing  disruption  attack  Dynamic  SourceRouting  (DSR).  To  validate  the  research,  a  case  study  is  presented  using  thesimulation with GloMoSum at different mobility levels. Simulation results show thatour  proposed  system  can  achieve  desirable  performance  and  meet  the  securityrequirement of MANET.
Anomaly detection using clustering for ad hoc networks -behavioral approach- Belacel Madani; B. Messabih
Computer Engineering and Applications Journal Vol 1 No 1 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.605 KB) | DOI: 10.18495/comengapp.v1i1.6

Abstract

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. Intrusion detection is the means to identify the intrusive behaviors and provide useful information to intruded systems to respond fast and to avoid or reduce damages. The anomaly detection algorithms have the advantage because they can detect new types of attacks (zero-day attacks).In this paper, the Intrusion Detection System clustering-based (ID-Cluster) that fits the requirement of MANET is presented. This work addresses both routing layer misbehaviors issues, with main focuses on thwarting routing disruption attack Dynamic Source Routing (DSR). To validate the research, a case study is presented using the simulation with GloMoSim at different mobility levels. Simulation results show that proposed system can achieve desirable performance and meet the security requirement of MANET.
Anomaly detection using clustering for ad hoc networks -behavioral approach- Belacel Madani; B. Messabih
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile   ad   hoc   networks   (MANETs)   are   multi-hop   wireless   networks   ofautonomous  mobile  nodes  without  any  fixed  infrastructure.  In  MANETs,  it  isdifficult to detect malicious nodes because the network topology constantly changesdue  to  node  mobility.  Intrusion  detection  is  the  means  to  identify  the  intrusivebehaviors and provide useful information to intruded systems to respond fast and toavoid  or  reduce  damages.  The  anomaly  detection  algorithms  have  the  advantagebecause  they  can  detect  new  types  of  attacks  (zero-day  attacks).In  this  paper,  wepresent  a  Intrusion  Detection  System  clustering-based  (ID-Cluster)  that  fits  therequirement of MANET. This dissertation addresses both routing layer misbehaviorsissues,  with  main  focuses  on  thwarting  routing  disruption  attack  Dynamic  SourceRouting  (DSR).  To  validate  the  research,  a  case  study  is  presented  using  thesimulation with GloMoSum at different mobility levels. Simulation results show thatour  proposed  system  can  achieve  desirable  performance  and  meet  the  securityrequirement of MANET.