This website uses cookies to ensure you have the best experience. Learn more

An Advanced Grammatical Evolution Approach For Intrusion Detection In Manet

1347 words - 6 pages

4. AN ADVANCED GRAMMATICAL EVOLUTION IN INTRUSION DETECTION ON MANETS

4.1 Attacks
In this paper, we use grammatical evolution to evolve intrusion detection programs for known attacks against routing protocols on MANET. ODMRP is one of the most important protocol in on demand multicast routing protocols on MANET.
4.1.1 Black hole attack
Black hole attack is a attack in which malicious node advertises itself as having the shortest path to a destination in the network. This will cause Denial of Service by dropping the received network packets .When a node requires a route to the destination it initiates a route discovery process by claiming to have the shortest route ...view middle of the document...

However, if an attacker simply forwards the packet without recording its IP in the packet, it makes two nodes that are not within the communication range of each other believe that they are neighbours (i.e., one-hop away from each other), resulting in a disrupted route.
4.1.3 Dropping attack
Packet dropping attack is also the type of denial of service attack in which a router is supposed to relay packets instead discards them. It occurs from a router becoming compromised from the number of different causes. Most of the packet losses are due to congestion in the wired network incaseof MANET there can be some transmission errors and mobility. The packet dropping can impact a network service on several aspects such as delay(dropping the retransmission of packet will increase transferring time ),response time(waiting long time for response),quality(dropping some packets will degrade the quality of service) and bandwidth(packet retransmission will increase the usage of bandwidth). Mobility of the nodes is the major cause of the packet dropping.
4.1.3 Route disruption attack
In this attack scenario the attacker sends join reply message to the victim node without receiving any join control packet from that node. The attacker node chooses one node as victim and send reply messages continuously to this node for disrupting the active routes in its routing table since the attacker is the neighbour of the victim node.
The program generated by the Advanced Grammatical evolution is distributed to all nodes in the network and listening the response alarm if there is any attack.

4.2 Grammatical evolution
In Grammatical Evolution, a problem is defined using the fitness function and the BNF grammar. Using this grammar the program is evolved and the known attacks are detected in MANET and response is raised. Libge library is used to evolve the overall evolution process.

Grammar used for problem
__________________________________________________
S =
::= if() raise alarm()
::= |
::= | ( ) |
() | () |
::= + | - | / | _
::= sin | cos | log | ln | sqrt | abs | exp | ceil | foor
::= max | min | pow | percent
::= < | _ | > | _ | == | =
::= and | or
::= packet related features
__________________________________________________
For this grammar the mobility related feature and the packet related features are considered at every time interval by each node.
The detection rate and the false positive rate of the intrusion is calculated using the fitness function, a fitness function is a particular type of objective function that is used to summarise, how close a given design solution is to achieving the set aims.

4.3 Experimental results
In this advanced grammatical evolution technique we used the simulator NS2 to simulate the results. Mobility of the nodes are generated using RandomWayPoint model using...

Find Another Essay On An Advanced Grammatical Evolution Approach for Intrusion Detection in Manet

Team Based Approach in an Organization

972 words - 4 pages The potential effectiveness of a team based approach in an organization is clear. However, getting the best outputs in team based approaches is also a challenge due to, for instance, poor team dynamics, lack of team harmony and such. Switching to a team based approach in an organization is, therefore, a decision that requires a lot of planning and analysis before implementation. Ordinarily, a decision to switch to a team based approach should

The Ethics for Engineers in Combining Humans with Advanced Robotics

2010 words - 9 pages has a big part to play in helping to resolve these looming issues. Arguments for enhancements stem from the ideas that enhancements are already being established and in use today. Things like advanced prosthesis, medical implants and artificial organs have already become accepted forms treatment. These devices have been employed to care for human deficiencies so advocates say why not use the technology to improve human limitations. Currently

Information Theory & Optimization for Location of Sensors in Water Distribution for Contaminant Detection

3483 words - 14 pages health of downstream population. The Rawal Dam is a key water supply resource for citizens of Rawalpindi and cantonment. The increasing population nearby of this dam such as Bari Imam, Noor pur shahan, Banigala, diplomatic Enclave and Quiad-e-Azam University contributing a lot of contamination in the dam. The increasing in the technology there are a number of new and advanced system which can be used for detection of contamination and alarming

F/CFAT : An Approach for Combined Safety and Security Analysis

1486 words - 6 pages different logic gates [5] [8]; and have not considered on the formal construction of the fault tree in a deductive manner. In these methods the formal model and the fault trees are developed as separate documents [7] [5] [6]. The safety analysts develop the fault trees by using their intuition, while the events and sub-events of a gate are formalized afterwards with respect to the formal model [8]. Although this approach is effective for quickly

Selcting an Approach for a Qualitative Research Plan

597 words - 3 pages Selecting an Approach for a Qualitative Research Plan Creswell (2013) contends that “we need to identify our approach to qualitative inquiry in order to present it as a sophisticated study, to offer it as a specific type so that reviewers can properly assess it, and…to offer some way of organizing ideas that can be grounded in the scholarly literature of qualitative research” (p. 69). Although I believe all three arguments cited by the author

An HMM-based Pre-training Approach for Sequential Data

2103 words - 9 pages particular, their original approach consisted in separately pre-train the RBM-part of the model using the contrastive divergence algorithm [2], and the RNN-part of the model using either the SGD method or a recently proposed Hessian-Free (HF) optimization method [4]. The pre-training method that we propose tries to improve the learning process by first modeling an approximation of the real probability distribution of the data. This initial, imprecise

Military Cyber: An Evolution In Command Relationships

1693 words - 7 pages USCYBERCOM. The GCCs and JFCS will need to share in the control of military cyber capabilities as they do with capabilities of other domains. Trying to fit global assets into a regional or geographic operational framework is not an easy task. War gaming and C2 exercises will help with this evolution of thought and military theory. USCYBERCOM’s centralized control of cyberspace operations does not give GCCs the desired seamless integration of

Decolonization: An Evolution In Imperialist Relationships.

1871 words - 8 pages way for the evolution of what is a natural government, consented to, by the people, but this was an ambition that was quickly interrupted by the reality of the unexpected violence that is believed to be an inherent part of any decolonization process. In addition to the more vivid examples of violence both during and after the initiation of the ‘decolonization’ process, Fanon argues that its cause is symptomatic of a nation being

FISH Technique: A Powerful Technique for the in Situ Detection of Organisms in Environmental Samples

578 words - 3 pages are attached via a methylene carbonyl linker. Due to their neutral charge, PNA probes have more robust hybridization characteristics than those of DNA probes. As conventional FISH probes, they are usually designed to target naturally abundant rRNA genes, thereby allowing the detection of microorganisms without the need for an amplification step. Finally, PNA-FISH probes are less susceptible to inhibition by impurities in different clinical

Computer Games: An Approach to Increase Critical Thinking in Mathematics

2565 words - 10 pages computer game to enhance their mathematical critical thinking skills for a period of 12 weeks. The expected results should demonstrate an increase of scores in the post-test from the treatment group compared to the comparison groups. Computer Games: An Approach to Increase Critical Thinking in Mathematics In recent years technology has changed the way people interact with one another. The advancements of technology have also increased the

Species-specific PCR based assay for detection of Phomopsis azadirachtae causing die-back disease in Azadirachta indica

618 words - 3 pages Azadirachta indica (Neem) is an evergreen tree, found predominantly in most tropical countries and native to Indian sub-continent [34]. India is the leading exporter of neem seeds and products, with an annual production of 4,42,300 tons of dry fruits, 10,700 tons of neem oil and 4,25,800 tons of neem cake, the monetary value coming to around several million dollars [17]. Since time immemorial, A. indica is documented for its medicinal properties

Similar Essays

Multi Thread Intrusion Detection System (Mids) For I Pv6 Networks

2109 words - 8 pages capabilities and application, additional security measure are required for next generation operational network for end to end communication. In this paper will elaborate the key threats associated with IPv6 and its possible solution. Intrusion detection system is one of the solutions available, although it is widely used in IPv4 networks, but there is no operational solution for IPv6. In this paper we have proposed an intrusion detection system (IDS

An Analysis Of Seawater Intrusion In Coastal Aquifers

803 words - 4 pages and fresh water are immiscible fluids which are separated by a sharp interface. This approach includes the diffusion and the effects of the hydrodynamic dispersion, the dependency of fluid density to flow and solute transport. Volker and Ruston’s (1982: ) model made use of the finite element method for salt water intrusion in coastal confined and unconfined aquifers. The dispersed interface approach requires there to be considered that a

The Evolution Of Gender Detection Protocols In Bioarchaeological Studies

2473 words - 10 pages sex of immature human skeletal remains using permanent tooth dimensions, J. Archaeol. Sci., 35, 158-168. Chang, Y. M., Burgoyne, L. A., Both, K. (2003) Higher failures of amelogenin sex test in an Indian population group, J Forensic Sci, 48, 1309–1313. Drobnič, K. (2006) A new primer set in a SRY gene for sex identification, International Congress Series, 1288, 268 – 270. Faerman, M., Filon, D., Kahila, G., Greenblatt, C.L., Smith, P., Oppenheim

Why Was China Such An Advanced Society For So Long?

2485 words - 10 pages Why Was China Such an Advanced Society for So Long? Throughout history, China has been the center of many developments allowing for it to establish itself as an advanced society, one that has lasted through a number of dynastic cycles, an attempt towards the creation of a Republic, and still existing, People’s Republic of China, under the rule of China’s Communist party. Throughout this turbulent history China has made much advancement in site