DOIONLINE

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2052

Publish In
International Journal of Advance Computational Engineering and Networking (IJACEN)-IJACEN
Journal Home
Volume Issue
Issue
Volume-3, Issue-5  ( May, 2015 )
Paper Title
Implementation Of Policy Enforcement Technique For Intrusion Detection System Using Manet's
Author Name
Ankita Sharma, Darshanaa Birkad, Sabisha Shetty, Shehnaz Jabbar, Hema Kolla
Affilition
Department of Computer Engineering, D.Y. Patil College of Engineering, Akurdi, Pune, India
Pages
64-69
Abstract
The transition to the wireless network from wired network has been a global trend in the past few decades. The wireless network has brought mobility and scalability making it possible in many applications. Among all wireless networks, Mobile Ad hoc Network (MANET) is one of the most significant and unique applications. Unlike the other network architecture, MANET does not require a fixed network infrastructure; every single node works as a transmitter as well as a receiver. When the nodes are in the same communication range, they communicate directly with each other. Else they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET makes it popular among critical mission applications like military use and emergency recovery. But the open medium and wide distribution of nodes has made MANET vulnerable to the malicious attackers. In such cases, it is important to develop efficient intrusion-detection mechanisms for the protection of MANET from attacks. We are witnessing a current trend of expanding MANETs into industrial applications due the advancements in the technologies and reduction in the hardware costs. For adapting such a trend, we believe that it is crucial to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system (IDS) named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. In comparison to the contemporary approaches EAACK demonstrates higher malicious-behavior detection rates in particular circumstances while not affecting the network performances. In our project we are implementing policy enforcement technique, where we control the access to a network. The term policy means some rules or usage parameters which are required to give access to the users and check whether the user is authorized or not. Keywords: EAACK, MANET, ad-hoc, IDS
  View Paper