Dynamic Cluster Based Intrusion Detection Architecture to Detect RoutingProtocol Attacks in MANETSarika Patil1 and Deepali Borade2*
- *Corresponding Author:
- Deepali Borade
Assistant Professor, Computer Engineering Department
Flora Institute of Technology, Pune, Maharashtra, India
E-mail: [email protected]
Received date: August 12, 2013; Accepted date: August 26, 2014; Published date: September 01, 2014
Citation: Patil S, Borade D (2014) Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun 2:116. doi:10.4172/2090-4886.1000116
Copyright: © 2014 Patil S, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Mobile Ad-Hoc Networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station. MANET is more vulnerable to different types of attacks and security threats because of its characteristics of mobility and dynamic nature. Intrusion means any set of action that attempts to compromise the integrity, confidentiality, availability of resources. We are implementing EAACK secure acknowledge based IDS to remove the drawbacks of Watchdog. By using the schemes of EAACK we propose a cooperative, dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET. The structural design is organized as a dynamic hierarchy in which data is acquired at the leaves and is incrementally aggregated, reduced, and analyzed as it flows upward toward the root. To maintain communications effectiveness, the hierarchy is automatically reconfigured as desired using clustering techniques in which cluster heads are selected based on topology and other criteria. The usefulness of the architecture is demonstrated via black hole attack scenarios in which attack is detected and removed. Reactive routing protocol is used as it provide better efficiency and hence to reduce the network overhead.