International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 4 – Oct 2014 Performance Evaluation of FBU-NDA Based IDS Using AODV in MANET TruptiAgrawal Swati Tiwari Research Scholar, Dept. of CSE Oriental University Indore (M.P), India Associate Prof.,Dept. of CSE Oriental University Indore (M.P), India Abstract— MANET is a less infrastructure network with vigorously changing topologies and arbitrary communicating node. At this time the mobile nodes communicate directly with additional nodes without any router and hence the preferred functionalities are embedded to each node. Since the MANETconsistof mobile nodes with less configuration of hardware and requirements compared to a router, henceprotocols and routing used are of lightweight functionalities. The range of protocol in MANET is categorized in two types: Proactive and Reactive. This work deal with enhancingMANET security through intrusion detection system for the AODV reactive protocol. The nodes that work towards degrading the normal network performance arecalled as malicious or attacker nodes. The sort of traffic generated by such node is nasty and affects the lifetime of network and other performance factor. Also the intruder’s node aim towards modification of actual packet information and forge them for diverting the network traffic through these malicious nodes which later on dropped or delayed. Hence, such intruder’s nodes need to be identified timely for making the safe and secure communication in the network. For the period of the last few years, many approaches had been suggested along with several intrusion detection systems. Though there are some problems which remain unaddressed and are not resolved as required. In the presence of these nodes or in delays of such detection the network performance gets down continuously. In this idea it proposes a novel scheme based on FBU-NDA (Feature Based Unified Node Data Analysis) for AODV in MANET. These scheme is capable of detecting the intruder’s node by continuously analyzing the network parameters and getting the acknowledgement counts. It also serves as a regular monitoring which access the behavior of each node. Result evaluation and comparison makes the actual assessment of the suggested approach and proves to be improved that traditional approach. Keywords— MANET (Mobile Ad-hoc Network), AODV (Ad-hoc On demand Distance Vector Routing), FBU-NDA(Feature Based Unified Node Data Analysis), IDS (Intrusion Detection System), Performance Factors; I. INTRODUCTION The wireless network is getting biggerand denser day by day. As the number of user are increasing with recent updating technologies. The wireless network is one of such network having large number of support for device applications. These networks provide mobility responsive communications within a particular network range. A wireless network is categorized into many subnetworks or domains supporting these technologies such as Global service for mobile(GSM), Code ISSN: 2231-5381 division multiple access(CDMA), Bluetooth, ZigBee, Mobile Network (MANET), Vehical Ad-hoc network(VANET), Cognitive, WSN etc. Further categorization of network is possible on the basis of dependency on device and their range of communication distance. Entire of this network works on radio transmission and applies through connection less protocols and sometimes also through connection oriented protocols. It ensures the successful data delivery to the destination from the source. MANET is a mobile ad-hoc network build by group of nodes in a specific range which can communicate directly with each another without any infrastructural requirements such as routers, switches and cables. Hence it is known as an infrastructure independent network. In this each node will serve as an infrastructure support for data or transfer instruction. There no controlling or observing power exists for dealing with this correspondence. Rather every single node will do the same. Here every hub acts as a switch and takes after a static or dynamic topology, implies it is continuously changing as the portability of hub builds. Hubs within one another's radio range communicateespecially by means of remote connections, while others which are located at a distance uses different other hubs to communicate [1]. Hubs normally disseminate the same physical media; they transmit and secure signs at the same frequency band from the aggregate accessible data transfer capacity, though the transmission is simple and not indigent the system is defenceless against the assault on the grounds that the security component is not legitimately started in such little run system. There are various factors which open the loose area for attack probability like false association links for communication between the nodes in the network, dynamically changing topology, limited power by battery etc. All this provides the weak zone for different kinds of attacks. The MANET is more prone to undergo from the intruderbehaviorcompared to the wired networks used traditionally [2]. Thus, it is compulsory to handle such security breaches, which are coming day by day in wireless networks. With increasing use and applications of MANET in market, security systems will also need to be made for each and every condition and issues. Most of the routingprotocol in MANET is of short range and lightweight protocol as they need to be executed in mobile environments and hence its size and environment must be small. http://www.ijettjournal.org Page 180 International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 4 – Oct 2014 The routing protocol in MANET assumes that each node in the network is a peer and not an intruder’s node or selfish node. Hence, only a node that deals with a foul node can cause the network to fall short such node is known as an intruder’s node.Thus a security system is used to provide the security from such intruder’s node and it is used to contantly monitor the activity of attack exposed nodes. The system that implement this task is known as an Intrusion Detection System (IDS) [3]. The system architecture for MANET regarding its functionsis both on level or multi-layer sort. Along these lines the best reasonable system structural engineering for a MANET build on upon its framework prerequisites which ought to be assaulted safest. II. RELATED STUDY In wireless network the activity which is unauthorized and not recognized with aim to make the normal performance of network down comes under the category of intrusions. Such intruder’s nodes and traffic need to be detected in early stages of communication to make the network works normal. This action is going to be executed on malicious node in a specific range of communication. Different nodes can correspond all the while alongside their directing topology redesigns at every hub because of their portability. This framework is getting complex & weak, which prompt most security issues. Interruption recognition or intruder detection might be utilized as a second level of security barrier to ensure the system from such issues. In the event that the interruption is located, a reaction could be started to forestall or minimize mischief to the framework. Interruption recognition might be grouped focused around investigating the chronicled information as either has based or system based. A system based IDS catch and breaks down parcels from a system activity while a hostbased IDS utilization working framework or application logs in its dissection. During the last few years, various authors had worked towards improving the IDS structure, working and functionality to achieve better goals in terms of performance, detection rate and accuracy. This process is based on data analysis of previous transmissions and identifying the traffic and nodes which are violating the communication rules. To build an efficient IDS mechanism some novel algorithms need to be developed and will serve as core components of design given by some rules and feature driven approaches [4]. Such features are the combination of facilities and output of the exacting algorithms. All the IDS has some of the common functionalities or components which are: Monitoring: use to monitor the nodes, neighbors or it. Database or log file: use to record the event by intrusion effect, make statistics and share with other nodes. Response: after intrusion detects, what system or node can do in reply or response. ISSN: 2231-5381 Classification based intrusion detection mechanism is given in the paper [5] using unsupervised learning methods. Totally the approach uses five algorithms for data evaluation and to achieve its goals multiple intermediate metrics are created for effective transformations. The paper also deals with tuning the classifiers for unknown type of attack which is determined by its historical data analysis. The approach used for this is called cross validation in which the data from the same types of attacks are available in all fields. This differs from real-world employment where unknown types of attacks may be present. The identified results indicate that weighted cost matrices can be used effectively, which developing an anti intruder system. For more upgrade secured a portion of the creators had centered their worries on security methods for interruption preventions. Among them most valuable is the encryption and validation, whichdiminish the dangers of interruption procedures, however, not had the capacity to uproot it totally. Subsequently, in the paper [6], creator proposes another quantitative technique for interruption identification which is a behavioral oddity based framework. In this work the key substance is the nearby IDS executor to every versatile hub. These operators run autonomously and screen exercises of the client and framework and correspondence exercises inside their radio extent to identify strange conduct. In the paper [7], a novel intrusion detection technique based on Enhanced Adaptive Acknowledgment (EAACK) for MANETs is proposed with right way evaluation. The paper shows higher maliciousness detection rates indefinite situations while does not greatly affect the network performances and behavior. The suggested approach consisted of three major components: ACK, secure ACK (S-ACK), and misbehavior report authentication (MRA) scheme. In process of distinguishing the packet types in different schemes, the paper included a 2-b packet header in EAACK. At the primary level of work the approach is generating effective results with minimum load. The paper [8], gives an intrusion detection scheme by integrating the outcomes of two anomaly based methods: Conformal Predictor k-nearest neighbor and Distance based Outlier Detection (CPDOD) mechanism. The collective effect of two anomaly mechanisms CP-KNN and DOD in a conditional succession structure gives better result and effective detection rates with higher accuracy in categorizing the traffic. A chain of the tentative results shows the valuable detection of anomalies with low false positive rate and higher accuracy is served by simulations in a given paper. Some of the researchers had also focused their intentions towards the intrusion detection system containg multifunctionality. The paper [9] suggests a novel cross layer IDS whose detection is more accurate with detection of attacks targeted at or from source. The recommended work gives a layered design for effective detection based on anomaly http://www.ijettjournal.org Page 181 International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 4 – Oct 2014 exposure by utilizing cluster data mining technique. The proposed cross-layer based intrusion detection architecture is designed to detect DOS attacks and sink hole attack at different layers of the protocol stack. The approach is also capable to detect various types of UDP flooding attack and sink hole attack in an efficient way. Various other approaches are proposed in the last few years based on existing method like a regulator in [10]. As the main advantage of it is that the watchdog only needs local information and, therefore, it becomes quite difficult for it to be badly influenced by another node. But it has two disadvantages: The watchdog is vulnerable to cooperative attacks, and It is not so accurate when we increase node's mobility. It also proposes an improvement in this mechanism which can be used in MANET. The watchdog is a basic module for several different IDS, making an extra effort for improving it becomes a necessity. The proposed improvements can cope up well with the watchdog weaknesses based on Kalman filters. Another improvement of the approach is evidence of collaborative black-hole attack. A secure exchange of information among nodes allows determining whether if a node is acting as an accomplice, and also marks it as being malicious. In the current paper [11], a comparison is made between various existing IDS based on inputs, outputs, processes, benefits and drops. After studying the various approaches and their benefits the paper also suggested some guidelines for selecting effective IDS for larger security. The paper also performs few experiments to prove the comparison results and will direct the further researches. The paper also presents a case study of an MIS/CIS/CS curriculum on the first introduction of the new technology for IDS in MANET. Similarly, carrying forward the above research concern a comparative study is developed to analyze the IDS architectures proposed in the existing literatures [12]. Taking forward the traditional intrusion detection mechanism some of the authors had worked with encryptions, firewalls, etc. Thus to detect the unauthorized access to the system in early phases of interactions the author introduces IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. This system is going to analyze the pattern of reuse. Result evaluation shows the limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives attacks [13]. III. PROBLEM DOMAIN The intrusion detection system is a type of analysis process that separates the trustworthy data from the intruder’s ISSN: 2231-5381 data. Behavior of each node in a network can be measured by calculating the difference between data and node. Trustworthy node which is generating the normal data can also be sometimes taken as intruder’s node from existing intruder detection systems. Thus the prime objective of this work is to make the system more accurate and fast is. Because of node’s lack of physical security, intruders can easily capture and compromise nodes to acquire attacks [14]. Intruders can easily compromise ad-hoc network by inserting uncooperative nodes into the network. In such case, it is necessaryto build an intrusion-detection system (IDS) due to the limitations of most mobile network routing protocols, nodes in networks assume that other nodes always cooperate with each other to relay data [15]. After analysing the various research articles this work had identified following area of work which remains unaddressed by the existing intruder detection system. With existing IDS it is very difficult to distinguish between normal traffic and intruder’s activity traffic. Thus the mechanism needs to be more productive to preempt those data losses by malicious nodes. In wireless network the connection is not static and mobile nodes can join and leave the network at any instance of time. On behalf of instance, a node which is in the short term out of synchronization may forward packets that could be considered of attack activities, IDS should use minimal resources that are not used in existing approaches. The current IDS mechanism is not able to detect false positive attacks and Partial drops started by an intruder’s node. Thus, this attacks need to be blocked. Data losses and identity theft by intruder’s nodes is generally affected by lack of central monitoring points. Many other problems like, uncertain collisions, recipient collisions, restricted transmission power (Links & Resources), false misbehavior report and Collision are the entities not been managed by existing system. IV. PROPOSED FBU-NDASOLUTION This paper gives a scheme to detect the malicious misbehaving nodes having usual collisions and packet droppings. Such node also generates the faulty misbehavior report that they are behaving well in the network while in reality they are harming the network performance by packet dropping. Thus, effective and on time identification of these nodes is necessary. Such identification is quite a tough task as the actual traffic is been analysed and after which the unreliable transmission is identified by comparing it with the exiting flow pattern. Thus helps in identification of false loss and flow. The proposed work will improve the deficiency of existing IDS which fails to detect the false misbehaviour timely. This work proposes a Feature Based Unified Node Data Analysis (FBU-NDA) [16] Based IDS through AACK for AODV protocol. It works on the basis of 4 modules. It starts with data gathering, categorization, processing and intimation. The above scheme is named as a FBU-NDA because in this a feature based node characteristic is analyzed and monitored for intruder’s identification. FBU-NDA can be measured through a threshold for behavioral pre-emption. http://www.ijettjournal.org Page 182 International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 4 – Oct 2014 Proposed Algorithms the packets and continuously exchange these data to map the intruder behavior identifications. Starts Protocol AODV () It traces the data and circulates it into the six categories: Hosts Counts, Behavior Analysis, and Acknowledgement count, Neighbors count, Packet sent and received. It saves the important details and patterns into some local data storage area. Now, this information is passed to the next module of FBU-NDA. FBU-NDA () { Starts New Route Broadcast RREQ to All Neighbors Wait for Reply Acknowledgement If (Destination D = = Receives Packet) { ACK==True; Revert RREP & ACK } Else ACK==False If (Source Rcv ACK == True && TTL==Fixed) Packet Delivered Successfully; Else Pact Fails; IDS Execute (); { Count (); Performance_Based_Detection (); Exit; } Count () // Definition of Function { Node (); // Total Number of Packets Sent & Received Neighbor (); //Listen Neighbors Transmission Report (); //After fixing Period of Time Nodes Give report to FBU-NDA Node } FBU-NDA_Performance_Based_Detection () { PDR (); Throughput (); Routing Overhead () If (PDR, Throughput, Routing Overhead < Threshold) Intrusion detected; } Description:In the above proposed algorithm of FBU-NDA [16], the intruder’s behavior in the MANET traffic can be evaluted by the regular monitoring of performance parameters. Initially, the network is regularly generating the data of flow structures when the network and its transmission are started. The host sends and receives data packets effectively by starting the communicating with each other. The FBU-NDA mechanism stores this report and transfer details in its identification unit in form of log. This identification unit continuously monitors the behavior of the each node, analyzes ISSN: 2231-5381 In this step the comprehensive acknowledgement node (FBU-NDA) starts getting the details related to intruders identification by analysis of the collected data. FBU-NDA works as a malicious behavior identification system by analyzing the information about packet drop by nodes and patterns by their generated log data. The scheme uses 3 steps for distributing the data and gathering the intruder’s behavior. These are throughput analysis, responsecount, and analysis of packet drop ratio. By using above steps the intruder’s behavior is determined and intruder’s node is recognized. In FBU-NDA processing unit, the definite data analysis is done for each and every participating node in data transfer, so if any one of the node is behaving uneven and making the data drops or losses then it has to be identified. This scheme uses a threshold value with which each node is taken as malicious or intruder’s node. When a node is above the specific threshold value, then it is a normal node. V. RESULT EVALUATION In order to measure and compare the performances of the proposed FBU-NDA scheme, the work continues to adopt the three performance metrics, First is Packet delivery ratio (PDR) which defines the ratio of the number of packets received by the destination node to the number of packets sent by the source node. Second is Routing overhead (RO) which defines the ratio of the amount of routing-related transmissions such as RREQ, RREP, ACK, 2ACK, S-ACK etc. Third is the throughput which gives the effectiveness of the systems in transmitting the packets. The proposed mechanism can be able to identify the attacks based on their types. This can be prevented before any damage or packet drops. Further, it can be extended to a few more parameters based upon the network density. This algorithm can also be extended to identify and avoid few more network layer attacks. To simulate proposed approach, a scenario is created by writing TCL (Tool Command Language) script in which fifteen nodes are created with specified coverage and transmission power. Further components are also clear in script file such as antenna type, routing protocol and queue type. Every node assigns hundred percent energy. TABLE I SIMULATION ENVIRONMENT Number of nodes Simulation time (seconds) Radio range Traffic type http://www.ijettjournal.org 20 75 280m FTP Page 183 International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 4 – Oct 2014 Packet size (bytes) Transmission energy consumption 512 1.0J Packet delivery ratio (PDR) – the ratio of the number of packets received at the destination and the number of packets sent by the source. In this PDR of the transmission at any given time is calculated as, Throughput-It is the sum of the sizes (bits) or number (packets) of generating/sending/forwarded/received packets, calculated at every time interval and divided by its length. Throughput (bits) is shown in bits. Throughput (packets) shows the numbers of packets in every time period. Time period length is identical to one second by default. PDR = (packets received/packets sent) GRAPH 1: E VALUATION OF PDR ANALYSIS OF E XISTING AND PROPOSED APPROACH After analysis of the result of various factors of the simulation environment, it is found that the packet delivery ration of the proposed approach is more than the existing approach and is shown in the above graph. It assures that after applying the suggested approach for intrusion detection the mechanism is capable of detecting the malicious behavior on time and will able to reduce the drops. Routing Overhead: In this evaluation number of routing packets transmitted for each data packet delivered at the destination. GRAPH 2: E VALUATION OF ROUTING OVERHEAD ANALYSIS OF EXISTING AND PROPOSED APPROACH While measuring the overhead associated for suggested scheme and the existing scheme for overall network it is found that the proposed mechanism is acquiring less control overhead than the existing approaches. ISSN: 2231-5381 GRAPH 3: C OMPARISON OF T HROUGHPUT ANALYSIS OF EXISTING AND PROPOSED APPROACH Another significant fact can be measured with respect to the approach is the power consumption of the nodes in the arrangement. After compared to other approaches, the proposed method presents a easy one-hop acknowledgement and one way trust record, termed as a semantic protection mechanism, seriously reduces overhead in the traffic and the transmission time. The overall transmission for sending and receiving data happens in just few milliseconds, overcoming the time constraint thereby reducing power consumption. VI. CONCLUSION Intruders or malicious nodes will bring great harm to the performance of MANET. Thus to make the network more secure and robust against these unwanted malicious node intrusion detection system is used. This paper will study various existing mechanisms to make some preventions regarding these intrusions. But they have some negatives also like timely analysis of misbehaving nodes, false identification, collision detection, central monitoring node, partial drops, etc. Thus this work proposes an improved IDS solution for overcoming these issues using FBU-NDA. The work uses a standard, centrally controlled monitoring node (FBU-NDA) which hear the transmission of other nodes also. These transmissions had a value compared with the standard threshold value to classify actual & misbehaving nodes. At the evaluation point of view the paper also presents some results with performance parameters analysis and comparison with existing systems. This workproved analytically that the suggested approach is effectively improving the network performance and is better than any of the traditional intrusion detection approach. Also the approach makes the network lives for more duration because of its less energy consumption and low overheads. http://www.ijettjournal.org Page 184 International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 4 – Oct 2014 FUTURE WORK Some problems and concepts that remain unaddressed can be performed in the future. Such as with the help of preemptive approach more information can be added for exact, timely analysis of intrusion & its successful detection with high accuracy. It can also be used for quantitative & qualitative analysis, rank ordering, etc. We also embed the source code of our proposed scheme in NS2 so as to use the benefits of an approach like open source. ACKNOWLEDGMENT This research work is self-financed and recommended from the university so as to enhance the security breaches with current techniques in mobile ad-hoc networks using IDS. Thus, the authors like to thank the anonymous reviewers for their valuable comments, which strengthened the paper. The authors also wish to acknowledgeOriental University, Indore administration for their support & motivation during this research. They also like to give thanks to Prof.JitendraChaudharyfor the discussion regarding the situational awareness system & for producing the approach adapted for this paper. [11] G. S. Mamatha1 and Dr. S. C. Sharma,”A New Combination Approach to Secure MANETS Against Attacks”, International Journal of Wireless & Mobile Networks (IJWMN), DOI: 10.5121/ijwmn.2010.2406, Vol.2, No.4, November 2010. [12] AikateriniMitrokotsa and Christos Dimitrakakis, “Intrusion detection in MANET uses classification algorithms: The effects of cost and model selection”, in ScienceDirect, Elsevier Publication, Journal of Ad-Hoc Networks, ISSN: 1570-8705, available at http://dx.doi.org/10.1016/j.adhoc.2012.05.006, 2012. [13] S. Mamatha and Dr A Damodaram, “Quantitative Behavior Based Intrusion Detection System for MANETS”, in Proc. of the Intl. Conf. OnAdvances in Computing and Communication (ICACC), ISBN: 978981-07-6260-5 doi: 10.3850/ 978-981-07-6260-5_59, April 2013. [14] Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, “EAACK—A Secure Intrusion-Detection System for MANETs”, in IEEE Transaction on Industrial Electronics, ISSN: 0278-0046,Vol. 60, No 3, March 2013. [15] Umesh Prasad Rout, “A Study of Intrusion Detection Systems in MANETs”, in International Journal of Research in Computer and Communication Technology, ISSN (Online) 2278-5841, Vol 2, Issue 2, Feb-2013. Pp 86-92. [16] Trupti Agrawal and Swati Tiwari. “A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET”, in International Journal of Computer Applications, ISBN : 973-93-8088385-7, September 18, 2014. REFERENCES [1] MarjanKuchaki Rafsanjani, Ali Movaghar, and FaroukhKoroupi, “Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes”, in World Academy of Science, Engineering and Technology, 2008. [2] M Salman Ashraf1 and Muhammad Raheel2, “RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks”, IJCSI International Journal of Computer Science Issues, ISSN (Online): 16940814, Vol. 9, Issue 2, No 2, March 2012, pp 306-313. [3] O. V. Chandure , A. P. Bakshi, S. P. Tidke and P. M. Lokhande, “Simulation of Secure AODV in Gray Hole Attack for Mobile Ad-Hoc Network”, in International Journal of Advances in Engineering & Technology, ISSN: 2231-1963, Vol. 5, Issue 1, Nov. 2012. , pp. 67-76. [4] Farhan Abdel-Fattah, Zulkhairi Md. Dahalin and ShaidahJusoh, “Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm”, in IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010. [5] RakeshShrestha, Kyong-Heon Han, Dong-You Choi and Seung-Jo Han, “A Novel Cross Layer Intrusion Detection System in MANET”, in IEEE International Conference on Advanced Information Networking and Applications, ISSN 1550-445X/10, DOI 10.1109/AINA.2010.52, 2010. [6] Tushar Sharma, MayankTiwari, Prateek Kumar Sharma, Manish Swaroop and Pankaj Sharma, “An Improved Watchdog Intrusion Detection Systems In Manet”, in International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2 Issue 3, March-2013. [7] Yi Li and June Wei, “Guidelines on Selecting Intrusion Detection Methods in MANET”, in Proc. Of ISECON (EDSIG), Vol.21, (Newport): §3233 (refereed), 2004. [8] Fanzine Pakzad, MarjanKuchaki Rafsanjani and ArshamBorumandSaeid, “The Improvement Steps of Intrusion Detection System Architectures of MANET”, in IJMAS, ISSN: 0973-7545, Vol. 22, Issue S11, 2011. [9] Mohammad Alattar, Françoise Sailhan and Julien Bourgeois, “Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol”, in International Journal of Distributed Sensor Networks Volume 2013, Article ID 521497, 20 pages at http://dx.doi.org/10.1155/2013/521497. [10] Charlie Obimbo and Liliana Maria ArboledaCobo, “An Intrusion Detection System for MANET”, Communications of Information Science and Management Engineering (CISME), Vol.2 No.3, 2012. Pp. 1-5 ISSN: 2231-5381 http://www.ijettjournal.org Page 185