Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

An optimized decision tree based approach for

intrusion detection system In MANET

Department of Data communication and Computer Networking


wollo university

by Zekarias Mulugeta
ID no (SGSE/0460/12)

presentation Mar,2020

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET1 / 20
Outline

1 Introduction
2 statment of the problem
3 objective
4 Literature Review
5 Methodology
6 Significance
7 Scope and limitation.
8 conclusion
9 conclusion
10 Reference

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET2 / 20
Introduction background

introduction

In early 1970s, MANET was called packet radio network


They had a project named packet radio having several wireless
terminals that could communication with each other on
battlefields.
A collection of mobile nodes, which forms a temporary network
without the aid of centralized administration.
Applications like military, emergency, conferencing and sensor
networks.
The proposed system incorporate :-
==> Address the problem of cheat node identification
==> Elaborate how the data collected and analyzed,
==> Describe effectiveness proposed IDS model
==> scope , significance of the study, work plan and budget

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET3 / 20
Introduction

overview

This misbehavior due to selfish or malicious reason decrease the


overall performance of mobile ad hoc network
Selfish/cheat node cannot cooperate with other node to forward
resource and preserving their own resource .
Intrusion :- unauthorized activity in a network.
Detection :-understand how attacker works and block activities.
Intrusion Detection Systems:-
=> Monitor malicious activities in a network, log information about
such activities, take steps to stop them.
=> Used in sending an alarm against any malicious activity in the
network.

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET4 / 20
Introduction overview

cont.....

Due to dynamic routing protocol properties mobile ad hoc network


is attacked by online intruder
MANET support multi hop communication to forward packet this
result in consumption of resource like battery and memory.to save
this resource selfish node created.

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET5 / 20
statment of the problem

statement of the problem


authors [1-4],define cheat node prevention way but none of them
consider increasing cheat node identification mechanism
is best solution to increase efficiency of MANET application packet
delivery
application like battle field communication and natural disaster
require real time and accurate packet delivery
decrease quality of service and cause of attack like denial of
service.
Research question
1. Is it possible to implement quick cheat node identification system
in MANET?
2. How does the cheat node affect the entire network performance
in MANET?
3. How to develop a simulation model to implement cheat node
identification mechanism using intermediate node and source
Node?
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET6 / 20
objective general objective

objective

General Objective
The main objective of this research is to Increase identification of
cheat node mechanism for successful application area of mobile ad
hoc network..
Specific Objective
Decrease risk of mobile ad hoc network application area.
To control packet lose between communication nodes.
To design quick identification of cheat nod.
Increase trust between communications of MANET
Increase network performance effectiveness.

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET7 / 20
Literature Review Literature Review

Literature Review

LincyEliebth and Jim Chacko [1] proposed decision tree and fuzzy
logic
=> for secure application increase packet delivery ratio.
The authors [2] proposed single and multiple attack scenarios
=>using behavioral analysis and distributed trust algorithm
identify 4 major attack in MANET .
Drs.Gopalakrishnan and Dr.A Rajesh [3]
=>proposed cluster formation and cluster agent selection with
intrusion detection map
=>proving its efficiency over different loads, traffics and security
levels from other DRINA and OEERP

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET8 / 20
Literature Review overview

cont.....

Sumiti and Sumit Mittal[4]


using watch dog, token based and agent based algorithm
parameter packet transmission ratio, byte transmission ratio ,packet
loss and packet delay
=> prove watch dog is good for paket delivery.

(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET9 / 20
Methodology Methodology

Methodology

quantities and design science method


use decision tree and fuzzy logic algorithm modeling the node
behavior.
The proposed system defines three routing model behavior to
perform network activity:
1) Naive node-forward packet with out expect other,( categorized
as genuine node).
2) Cheat node- need help from other but no offer to help
other(dishonest)
3) Vindictive Dc node- helps other node and observes the
behavior of other node ( Dendritic cell )

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
10 / 20
Methodology overview

cont.....

source and intermediate node identify the dishonest node


using ACK and launch PAMP signal
source and intermediate node identify the dishonest
=> overwrite cheat node buffer using PAMP signal.
=>Controlling cheat nodes using decision tree and fuzzy logic
algorithm by
=>considering the three parameters
=>danger signal sent, number of time PAMP sent and PAMP
strength increased using source and intermediate node.
=>Analyze the network performance in terms of cheat node
probability, end to end delay and packet delivery ratio.

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
11 / 20
Methodology overview

cont.....

design Methodology
The procedure that focuses step by step the way to maximize
identification of cheat node in MANETs

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
12 / 20
Methodology methodology

cont..

Data collection techniques and tools


=> for data gathering
surveying of papers and articles
Google and different website
Tools
Ns-2 network simulation tools for result analysis.

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
13 / 20
Significance Significance

Significance

used for :-
==> Enables for mobile ad hoc network application more efficient .
==> Enables to maximize the cooperation between nods.
==>To improve network security using quick cheat node
identification mechanism
==> To enable enhancing packet delivery ratio between nodes.

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
14 / 20
Scope and limitation. Scope and limitation

Scope and limitation.

The proposed system does not consider the power issue related
to each node because to include this it is time consume and
complex.
It focus only increasing selfish node identification by using source
and intermediate node as vindictive to increase node cooperation
and efficient application in mobile ad hoc network.

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
15 / 20
conclusion work plan

work plan

work plan

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
16 / 20
conclusion budget plan

budget

The buget plan

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
17 / 20
Reference Reference

Reference

[1] Lincy Eliebth and Jim Chacko “decision tree based AIS
strategy for Intrusion Detection in MANET,”2019 IEE Region 10
conference (TENCON 2019)

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
18 / 20
Appendix Reference

Reference I

[1] Lincy Eliebth and Jim Chacko


“decision tree based AIS strategy for Intrusion Detection in
MANET,”.
2019 IEE Region 10 conference (TENCON 2019)
[2] G.Vasser , G,Gahi and D..Gahi
“Novel Intrusion Detection and Prevention for MANET,”.
MAY 2019 IEEE CONSUMER ELECTRONICS MAGAZINE
[3] Drs.Gopalakrishnan and Dr.A,
“Cluster based Intrusion Detection System for Mobile Ad-hoc
Network”.
2019 Fifth International Conference on Science Technology
Engineering and Mathematics (ICONSTEM)

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
19 / 20
Appendix Reference

Reference II

[4]Sumiti and Sumit Mittal,


“An Experimental Analysis on Selfish Node Detection Measures
and Methods” .
International Journal of Innovative Technology and Exploring
Engineering (IJITEE).
[5] M. Lalli and V. Palanisamy
Intrusion Detection for MANET to Detect Unknown Attacks Using
Genetic Algorithm”.
2014 IEEE International Conference on Computational Intelligence
and Computing Research

(wollo university) An optimized decision tree based approach for intrusionpresentation


detection system
Mar,2020
In MANET
20 / 20

You might also like