Packet Drop Attack Detection Framework with the Concern of Node Failures and Intruders Presence

Authors

  • Niyaz Hussain A M J, Dr G Maria Priscilla

Abstract

In mobile ad hoc network, most vulnerable threat is intrusion attacks, where normal packet transmission behaviour is interrupted and leads to degradation in entire network performance. Network services, service quality will be reduced because of this interruption in packet transmission. So, intrusion attacks like packet dropping attacks in environment needs to be detected for avoiding such degradation. A technique called Secondary Server based Distributed and Cooperative Intrusion Detection System (SS-DC-IDS) is introduced in the previous research work. Network failures produced due to network intrusion attack or node failures are not differentiated in this research work. A technique called Node Failure aware Packet Drop Attack Detection Method (NF-PDADM) is introduced in this proposed research work for focusing and resolving this issues. Considered the mobility factor in this research. In two conditions, node failures like packet dropping attack may happen, either with node movement or with IDS attacker’s presence. Network learning mechanism based on packet transfer is used to differentiate between node failure due to IDS attack and node mobility using neighborhood communication. Instead of re-establishing another route path, required resources are supplied for avoiding node failure. An improved animal migration algorithm is used here for selecting secondary server and objectives like distance to primary server, bandwidth and energy are considered. In NS2 simulation environment, performed this research work’s overall analysis. When compared with available research work, better outcome is produced by proposed research technique as proven in the simulation results.

Keywords- Secondary server, rerouting, packet transmission behavior, node failure, packet dropping attack, intrusion attacks.

Published

2020-12-07

Issue

Section

Articles