Date post: | 26-Oct-2014 |
Category: |
Documents |
Upload: | syedshahnawazhusain |
View: | 38 times |
Download: | 3 times |
1
1. Introduction
An Adhoc network is a collection of nodes that are capable to form dynamically a
temporary network without the support of any centralized fixed infrastructure. Two
important properties of an Adhoc network are that it is self-organized and adaptive. The
absence of a fixed infrastructure requires mobile hosts in MANETs to cooperate with
each other for message transmissions. To form such a cooperative self-configurable
environment, every mobile node is supposed to be a friendly node and is willing to relay
messages for others to their ultimate destinations. Global trustworthiness in all network
nodes is the main fundamental security assumption in MANETs.
Adhoc wireless networks inherited the traditional problem of wireless and mobile
communication, such as band width optimization, power control and transmission
quality enhancement [1]. In addition topology is highly dynamic & random & very hard
to predict. Physical security is limited. Detecting malicious nodes in Adhoc network in
which participating nodes have no previous security association’s presents a number of
challenges not faced by traditional wired networks. The major issues irrespective of
traditional wireless system, are given as
• Highly Dynamic Topology
• Routing in Mobile Adhoc Network
• Security in Mobile Adhoc Network
• IP Configuration in Mobile Adhoc Network
• Battery Backup Problem
Intrusion detection is a security technology that attempts to identify individuals who
are trying to break into and misuse a system without authorization and those who have
legitimate access to the system but are abusing their privileges [2]. The system
protected is used to denote an information system being monitored by an intrusion
detection system. It can be a host or network equipment, such as a server, a firewall, a
router, or a corporate network, etc [3].
In MANETs, intrusion prevention and intrusion detection techniques need to
complement each other to guarantee a highly secure environment. They play different
roles in different status of the network. Intrusion prevention measures, such as
encryption and authentication, are more useful in preventing outside attacks. Once the
2
node is compromised, however, intrusion prevention measures will have little effect in
protecting the network. Therefore, Intrusion Detection Systems (IDSs), serving as the
second line of defence for Adhoc Network.
2. Motivation
Research on IDSs began with a report by Anderson [4] followed by Denning’s
seminal paper [5], which lays the foundation for most of the current intrusion detection
prototypes. Since then, many research efforts have been devoted to wired network IDSs.
Numerous detection techniques and architecture for host machines and wired networks
have been proposed. A good taxonomy of wired IDSs is presented in [3].
Mobile Adhoc Network IDS is categorized as Incentive Based approaches and
Reputation based approach. And reputation based approaches are punishing the intruder
nodes whereas incentive based approach foster the positive behaviour of the node. A lot
of research work is done in each phase but no one is perfect and able to provide the
complete solutions for MANET IDS. For Incentive based approaches models and
algorithms are proposed by Zhang et al. [6], Huang et. Al [7], Bhargava and Agrawal
[8], Bal Krishnan [9], Razak et. Al [10] Abusalah et. Al [11] Pirzada et. Al [12], Yan et.
Al [13], Eschenauer et. Al [14], Mahmoud et. Al [15], Ping Y. et. Al [16], Komninos N.
[17], & Ramachandran , C. et. Al [18]. All of them provided very good solution but
each one has its own limitations like model is limited only for misuse detection, rules
are very brief, model is routing protocols dependent, most of them are conceptual model
and no statistics are considered, dependent on geography and mobility, centralized
architecture is needed. Some models/ algorithms are not IDS but proposal for only
reliable routing, and detect specific kind of attacks.
For Reputation based schemes also lot of research work is done, including Song et.
Al [19], Yan et. Al [20], Mundinger J. et. Al [21], Subhadrabandhu, D. et. Al [22],
Perich, F. et. Al [23], Haiyun Luo et Al. [24], Madhavi et. Al [25], Rebahi, Y. et Al.
[26]. Each scheme has its own advantages and disadvantages also. Most of them are
based on Watchdog mechanism but it is helpful when we have one or two compromised
node in the network. If number increased more than that then this schemes fails and also
reputation based scheme punishes the node and boycott it for further communication.
Adhoc environment is based on friendly atmosphere and chances of false positive are
3
very high and if we are punishing the node forever then network will be destroyed
automatically.
So for this research we will use incentive based schemes and try to resolve the
limitation imposed by the previous research and identified certain Rules of Thumb for
preceding the work further.
2.1 Rules of Thumb for Intrusion Detection System in Adhoc
Environment
1. It should be Platform Independent & Geographical independent.
2. No Restriction over mobility while designing and during deployment of IDS.
3. IDS for MANET should not be Routing Protocol dependent.
4. It should be Light Weighted and Fast Responsive.
5. Reduced False Alarm and high number of True Positive.
6. No overhead while number of nodes increases (It should be easy to adapt
scalability).
7. Not only to prevent specific kind of attacks and allows the attack which are not
defined in definitions of attacks.
8. Suitable Deployment of IDS in layered Architecture.
9. A node should not be declared permanently as an Intruder.
10. Never rely on decision of single node, Fair Voting mechanism should be there
while declaring a node as intruder.
4
3. Statement of the Problem
It is very challenging to design an intrusion detection system for mobile ad-hoc net-
works. The lack of fixed infrastructures and monitoring points make it difficult to
collect audit data for the entire network. MANET’s scared resources should be
considered while designing the IDS framework. In MANET it is more difficult to
distinguish between false alarms and real intrusions.
Main objective of the research is to design the Intrusion Detection Framework for
Intrusion Detection System in mobile Adhoc environment. This problem can be divided
into following sub problems.
3.1 To Design Light Weighted Intrusion Detection Framework For Mobile
Adhoc Environment.
3.2 To Construct Detection Engine Based On The Statistical Security Features
3.3 To Evaluate The Performance Of The MANET Intrusion Detection System
& Validate The Work.
4. Description of the Research work
a. Problem Definition
The first question in intrusion detection research is what statistical features of interest
should be used to construct the model. In the history, short sequences of system calls
used by privileged processes can be used to effectively distinguish normal and intrusive
behaviour and utilized to construct host based IDSs. Tcpdump data may be used to
construct detection engine for attacks possible using TCP Segment Header. However
Adhoc Network is in its premature stage and no application is designed to use the
services of TCP protocol till date. But, likely to be designed in future and most probable
solution for Attacks using TCP Segment is described and important Friend Features are
used to detect the Intruder and normal node. Model File is generated which could be
used for predicting the behaviour of the node.
By collecting the statistical features of interest based on the experimental results, to
identify the malicious and normal node for Denial of Service attack, Black Hole Attack
5
and worm hole attacks for Network Layer, attacks are not limited there subcategory
included packet drops, delay in packet transmission, cache poisoning and selfishness.
The performance of the system is obtained with and without attacks and describes that if
there is only one malicious node then how much extent it can disturb the network.
Except the TCP segment header based attack rest of the simulation will be carried out in
approximately real scenario, as we know that the main contribution of the Adhoc
network is towards the military application hence in maximum cases number of nodes
may be limited that’s why we take only 21 nodes and there speed will vary from (0-20)
m/sec which is logically acceptable and trajectory they will follow a random trajectory
likely to be similar to the real environment. However research is not limiting to the
scalability or number of malicious or trusted node. In this research we have applied only
one malicious node and collected the statistics for that node. If number of malicious
nodes will increase then it has no impact on research because in this designing of
detection system, whatever the number of trusted or malicious node present in the
network.
b. Research Methodology
After extensive research and analysis, we have decided to take Opnet Modeler for
running the simulation for different kind of attacks and measuring the performance with
and without attack, then data generated by the simulation is collected and features are
identified for attacks and rule set are designed then for training and testing the data set
SVM LIGHT
is used, which is best among the ANN and other mining tools [27], [28],
[29], [30], [31], & [32].
Hence for Network Simulation
Opnet Modeler (Version 14.0 and above)
For classification and Prediction (Data Mining Tools)
SVMLIGHT
; used binary classification.
5. Proposed Contents of the Thesis
It is very difficult to design a once-for-all intrusion detection system. Instead an
incremental enhancement strategy may be more feasible. A secure protocol should at
least include mechanisms against known attack types. In addition, it should provide a
scheme to easily add new security features in the future. The general methodology is:
we first identify the attacks possible in Adhoc Environment then develop framework to
facilitate the cooperation of IDS and design of detection engines using statistics
6
collected for known attack types. The whole dissertation is organized as follows.
Chapter II, summarizes the related work which has been done in wired and wireless
intrusion detection systems. We further introduce a few important existing prototypes
and detection algorithms for Mobile Adhoc Networks, and demonstrate that very few
research efforts have been devoted to MANET IDSs. On behalf of the literature review
we identify Research Gap and rules of thumb for Adhoc Network. Note that the
research described in this dissertation only focuses on the detection part, although
intrusion response component is necessary in the system.
In Chapter III, we proposed the prototype model which we will use for further
Intrusion Detection System; In this we divided the model in two modules Local IDS and
Global IDS, local ids will work on the data collected from the network and identify the
friend list for first phase, these friend list are again tested in Global IDS module for
rigorous checking, before declaring a node as friend or intruder Gids will use the voting
mechanism. In this chapter we will discuss the tools used for simulation to extract the
features and statistics to design the detection engine.
In Chapter IV, attacks applied to the network using TCP segment header and collect
the result to design the detection engine for Transport layer, training and testing of data
set to design the detection engine and to check the accuracy of the detection system.
However, it is not necessary in this dissertation but it will provide the new directions in
the field of security for Mobile Adhoc Network.
In Chapter V, Denial of Service attack applied to the network layer of Adhoc
Network, evidences are collected to design intrusion detection engine specifically to
defend against Denial of Service attacks. Feature extraction and induction of rule sets
from the statistics collected, and applied to design detection engine, support vector
machine is used to check the accuracy of the detection engine.
In Chapter VI, Black Hole and Worm Hole attacks are applied to the Adhoc Network.
Evidences are collected, features are extracted and rules are inducted to design intrusion
detection engine specifically to defend against Black Hole attacks for MANET Intrusion
Detection System (IDS). Support Vector Machine is used for training and testing the
data set and checking the accuracy of the model file generated which will be used to
deploy for detection engine.
7
Chapter VII concluded this dissertation and lists important future work. Because not
many research efforts have been devoted to MANET IDSs, this research only provides
the initial effort in constructing a viable and statistical based MANET IDS.
6. Conclusion
This research describes a Cooperative Friend Features based Intrusion Detection
System for mobile ad-hoc networks. It consists of the detailed description of the local
IDS and the Global IDS based framework for the IDS. They complement each other to
make complete intrusion detection system for MANETs. Because of the importance of
routing protocols in MANETs, we implemented and carried out the simulation using
Reactive based routing because it is best suited for Adhoc Environment but research can
be carried out using proactive based routing also.
Model is designed for MAC Layer as well as Network Layer based Intrusion detection
system, but we implemented it only for Network Layer i.e. Anomaly based Intrusion
detection system.
7. References
[1] Chakrabarti, S.; Mishra, A.; , "QoS issues in ad hoc wireless networks," Communications
Magazine, IEEE , vol.39, no.2, pp.142-148, Feb 2001, doi: 10.1109/35.900643
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=900643&isnumber=19494
[2] Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Grance, T.; Heberlein, L.T.; Ho, C.-L.;
Levitt, K.N.; Mukherjee, B.; Mansur, D.L.; Pon, K.L.; Smaha, S.E.; , "A system for
distributed intrusion detection," Compcon Spring '91. Digest of Papers , vol., no., pp.170-
176, 25 Feb-1 Mar 1991, doi: 10.1109/CMPCON.1991.128802
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=128802&isnumber=3600
[3] H. Debar, M. Dacier, and A.Wespi, “A Revised Taxonomy for Intrusion Detection
Systems,” Annales of Telecommunications, vol. 55, pp. 361-378, 01July, 2000 Springer Paris
ISSN- 0003-4347. doi: 10.1007/BF02994844
URL: http://www.springerlink.com/content/4xq65ng0l0801626/
[4] J. P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical Report,
James P. Anderson Co., Fort Washington, PA, April, 1980.
8
[5] Denning, D.E.; , "An Intrusion-Detection Model," IEEE Transactions on Software
Engineering, , vol.SE-13, no.2, pp. 222- 232, Feb. 1987, doi: 10.1109/TSE.1987.232894
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1702202&isnumber=35884
[6] Yongguang Zhang and Wenke Lee. 2000. Intrusion detection in wireless ad-hoc networks. In
Proceedings of the 6th annual international conference on Mobile computing and networking
(MobiCom '00). ACM, New York, NY, USA, 275-283. DOI=10.1145/345910.345958.
URL: http://doi.acm.org/10.1145/345910.345958
[7] Yi-an Huang and Wenke Lee. 2003. A cooperative intrusion detection system for ad hoc
networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor
networks (SASN '03). ACM, New York, NY, USA, 135-147. DOI=10.1145/986858.986877
URL: http://doi.acm.org/10.1145/986858.986877
[8] Bhargava, S.; Agrawal, D.P. , "Security enhancements in AODV protocol for wireless ad
hoc networks ," Vehicular Technology Conference, 2001. VTC 2001 Fall. IEEE VTS 54th,
vol.4, no., pp.2143-2147 vol.4, 2001, doi: 10.1109/VTC.2001.957123
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=957123&isnumber=20686
[9] Balakrishnan, K.; Jing Deng; Varshney, V.K.; , "TWOACK: preventing selfishness in
mobile ad hoc networks," Wireless Communications and Networking Conference, 2005
IEEE , vol.4, no., pp. 2137- 2142 Vol. 4, 13-17 March, 2005, doi:
10.1109/WCNC.2005.1424848
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1424848&isnumber=30731
[10] Razak, S.A., Furnell, S., Clarke, N. Brooke, P. Mehrotra, Sharad. Zeng, Daniel, Chen,
Hsinchun. Thuraisingham, Bhavani. “A Two-Tier Intrusion Detection System for Mobile
Ad Hoc Networks--A Friend Approach”, Lecture Notes In Computer Science, volume 3975,
pp. 590-595, 2006, Springer Berlin / Heidelberg. doi: 10.1007/11760146_62
URL: http://dx.doi.org/10.1007/11760146_62
[11] Abusalah, L.; Khokhar, A.; Guizani, M.; , "NIS01-4: Trust Aware Routing in Mobile Ad
Hoc Networks," Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE,
vol., no., pp.1-5, Nov. 27 Dec.1, 2006, doi:10.1109/GLOCOM.2006.264;
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4150894&isnumber=4150630
9
[12] Pirzada, A. A and McDonald, C. “Establishing Trust in Pure Ad-Hoc Networks”. In
Proceedings of the 27th Australasian Computer Science Conference (ACSC’04), Dunedin,
New Zealand, vol 26, pp. 47-54, 2004.
URL: http://portal.acm.org/citation.cfm?id=979929
[13] Yan, Z., Zhang, P. and Virtanen, T. "Trust Evaluation Based Security Solution in Ad Hoc
Networks". In Proceedings of the 7th Nordic Workshop on Secure IT Systems, NordSec
2003, Gjovik, Norway, pp. 1-14. URL:
http://www.citmo.net/library/Trust_Evaluation_Based_Security_Solution_in_Ad_Hoc_Netw
orks.pdf
[14] Eschenauer, L. “On Trust Establishment in Mobile Ad-Hoc Networks,” Lecture Notes in
Computer Science, Volume: 2845, Year 2004, Springer Berlin / Heidelberg. Isbn: 978-3-
540-20830-3, Doi: 10.1007/978-3-540-39871-4_6
URL: http://dx.doi.org/10.1007/978-3-540-39871-4_6
URL:http://www.springerlink.com/content/97ge3hn0k6crcdht/
[15] Mahmoud, M.; Shen, X.; , "FESCIM: Fair, Efficient, and Secure Cooperation Incentive
Mechanism for Multi-hop Cellular Networks,", IEEE Transactions on Mobile Computing,
vol. PP, no.99, pp.1, 0, doi: 10.1109/TMC.2011.92
URL:
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5765975&isnumber=4358975
[16]Yi Ping, Zou Futai, Jiang Xinghao, Li Jianhua, Multi-agent cooperative intrusion response
in mobile adhoc networks, Journal of Systems Engineering and Electronics, Volume 18,
Issue 4, December 2007, Pages 785-794, ISSN 1004-4132, 10.1016/S1004-4132(08)60021-
3.
URL: http://www.sciencedirect.com/science/article/pii/S1004413208600213
[17] Nikos Komninos, Dimitris Vergados, Christos Douligeris, Detecting unauthorized and
compromised nodes in mobile ad hoc networks, Ad Hoc Networks, Volume 5, Issue 3, April
2007, Pages 289-298, ISSN 1570-8705, 10.1016/j.adhoc.2005.11.005.
URL: http://www.sciencedirect.com/science/article/pii/S1570870505001113
[18] Chandrasekar Ramachandran, Sudip Misra, Mohammad S. Obaidat, FORK: A novel two-
pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks,
Computer Communications, Volume 31, Issue 16, 25 October 2008, Pages 3855-3869, ISSN
0140-3664, 10.1016/j.comcom.2008.04.012.
10
URL: http://www.sciencedirect.com/science/article/pii/S0140366408002314
[19] Chengqi Song, Qian Zang,” OHM- Suppressing selfish behavior in adhoc networks with
one more hop” 5th International ICST Conference on Heterogeneous Networking for
Quality, Reliability, Security and Robustness, 2008, ISBN:978-963-9799-26-4.
URL: http://dl.acm.org/citation.cfm?id=1741551
[20] Yan, Z., Zhang, P. and Virtanen, T. "Trust Evaluation Based Security Solution in Ad Hoc
Networks". In Proceedings of the 7th Nordic Workshop on Secure IT Systems, NordSec
2003, Gjovik, Norway, pp. 1-14. URL:
http://www.citmo.net/library/Trust_Evaluation_Based_Security_Solution_in_Ad_Hoc_Netw
orks.pdf
[21] Jochen Mundinger, Jean-Yves Le Boudec, Analysis of a reputation system for Mobile Ad-
Hoc Networks with liars, Performance Evaluation, Volume 65, Issues 3-4, March 2008,
Pages 212-226, ISSN 0166-5316, 10.1016/j.peva.2007.05.004.
URL: http://www.sciencedirect.com/science/article/pii/S016653160700048X
[22] Subhadrabandhu, D.; Sarkar, S.; Anjum, F.; , "A framework for misuse detection in ad hoc
Networks-part I," Selected Areas in Communications, IEEE Journal on , vol.24, no.2, pp.
274- 289, Feb. 2006, doi: 10.1109/JSAC.2005.861387
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1589108&isnumber=33490
[23]Perich, F.; Undercoffer, J.; Kagal, L.; Joshi, A.; Finin, T.; Yesha, Y.; , "In reputation we
believe: query processing in mobile ad-hoc networks," Mobile and Ubiquitous Systems:
Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International
Conference on , vol., no., pp. 326- 334, 22-26 Aug. 2004, doi:
10.1109/MOBIQ.2004.1331739
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1331739&isnumber=29413
[24] Haiyun Luo; Jiejun Kong; Petros, Z.; Songwu Lu; Lixia Zhang; , "Providing robust and
ubiquitous security support for mobile ad-hoc networks," Network Protocols, 2001. Ninth
International Conference on , vol., no., pp.251-260, 14-14 Nov. 2001, doi:
10.1109/ICNP.2001.992905
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=992905&isnumber=21404
[25] Madhavi, S.; , "An Intrusion Detection System in Mobile AdHoc Networks," International
Conference on Information Security and Assurance, 2008. ISA 2008., vol., no., pp.7-14, 24-
26 April 2008, doi: 10.1109/ISA.2008.80
11
URL:
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4511525&isnumber=4511515
[26] Rebahi, Y.; Mujica-V, V.E.; Sisalem, D.; , "A reputation-based trust mechanism for ad hoc
networks," 10th IEEE Symposium on Computers and Communications, 2005. ISCC 2005.
Proceedings. , pp. 37- 42, 27-30 June 2005, doi: 10.1109/ISCC.2005.17
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1493704&isnumber=32117
[27] Andrew H. Sung, Srinivas Mukkamala, ”Feature Selection for Intrusion Detection using
Neural Networks and Support Vector Machines”, Transport Research Record published by
TRB Journal 2003,Issue number 1822, ISSN: 0361-1981, pp 33-39. URL:
http://dx.doi.org/10.3141/1822-05
[28] Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Intrusion detection using an
ensemble of intelligent paradigms, Journal of Network and Computer Applications, Volume
28, Issue 2, April 2005, Pages 167-182, ISSN 1084-8045, 10.1016/j.jnca.2004.01.003.
(http://www.sciencedirect.com/science/article/pii/S1084804504000049)
[29] L.V. Ganyun, Cheng Haozhong, Zhai Haibao, Dong Lixin, Fault diagnosis of power
transformer based on multi-layer SVM classifier, Electric Power Systems Research, Volume
74, Issue 1, April 2005, Pages 1-7, ISSN 0378-7796, 10.1016/j.epsr.2004.07.008.
(http://www.sciencedirect.com/science/article/pii/S0378779604001944)
[30] Emre Çomak, Ahmet Arslan, İbrahim Türkoğlu, A decision support system based on
support vector machines for diagnosis of the heart valve diseases, Computers in Biology and
Medicine, Volume 37, Issue 1, January 2007, Pages 21-27, ISSN 0010-4825,
10.1016/j.compbiomed.2005.11.002.
(http://www.sciencedirect.com/science/article/pii/S0010482505001484)
[31] Shang-Ming Zhou; Gan, J.Q.; , "Constructing L2-SVM-Based Fuzzy Classifiers in
High-Dimensional Space With Automatic Model Selection and Fuzzy Rule Ranking," Fuzzy
Systems, IEEE Transactions on , vol.15, no.3, pp.398-409, June 2007, doi:
10.1109/TFUZZ.2006.882464
URL:
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4231867&isnumber=4231848
[32] Jung-Hsien Chiang; Pei-Yi Hao; , "Support vector learning mechanism for fuzzy rule-
based modeling: a new approach," Fuzzy Systems, IEEE Transactions on , vol.12, no.1, pp.
1- 12, Feb. 2004, doi: 10.1109/TFUZZ.2003.817839
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1266382&isnumber=28327
12
8. List of Publication Based on Research Work
Journals:
[1] Husain Shahnawaz, Gupta S.C., "Friend Features Extraction to Design Detection
Engine for Intrusion Detection System in Mobile Adhoc Network", Communicated in
International Journal of Computer Science & Information Technology, ISSN 0975-
9646, Vol (2) Issue 4, 2011, indexed in Google Scholor, Open J Gate, Cabell
Publishing, Index Copernicus.
U.R.L http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020440.pdf
Citation Rate: Cited by 2
[2] Husain S.; Gupta, S.C.; , “Black Hole Attack in AODV & Friend Features
Extraction to Design Detection Engine for Intrusion Detection System in Mobile Adhoc
Network”, accepted for publication in Journal of Engineering Science and Technology
(JESTEC) in vol. 7 issue 5 October 2012, an open access peer reviewed journal ;
ISSN : 1823-4690. Indexed in Scopus. URL: http://jestec.taylors.edu.my/
International Conferences:
[1] Husain, S.; Gupta, S.C.; , "A proposed model for Intrusion Detection System for
mobile adhoc network," Computer and Communication Technology (ICCCT), 2010
International Conference on , pp. 99-102, 17-19 Sept. 2010, doi:
10.1109/ICCCT.2010.5640420
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5640420&isnumber=5
640373
URL for Scopus: http://www.scopus.com/inward/record.url?eid=2-s2. 08650556940
&partnerID =40&md5=a87b99b547c8abd7a05d04e0407e875b
Citation Rate: Cited by 3
[2] Husain Shahnawaz,; Gupta, S. C.;, "Denial of Service attack in AODV & friend
features extraction to design detection engine for intrusion detection system in Mobile
Adhoc Network," Computer and Communication Technology (ICCCT), 2011 2nd
International Conference on , vol., no., pp.292-297, 15-17 Sept. 2011, doi:
10.1109/ICCCT.2011.6075162
13
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6075162&isnumber=6
075092
ScopusURL:http://www.scopus.com/inward/record.url?eid=2-s2.0-
82955227957&partnerID=40&md5=56547f7563113d1108a2236767447afe
Citation Rate: cited by 1
Communicated:
[1] Husain S.; Gupta, S.C.; , “Worm Hole Attack in AODV & Friend Features
Extraction to Design Detection Engine for Intrusion Detection System in Mobile Adhoc
Network”, communicated in International Journal of Adhoc Network published by
Elsevier, ISSN : 1570-8705.
Other papers Published: (Included in Introduction)
[1] Husain. Shahnawaz, S.C Gupta,” A Fair Load Distribution with Greedy Booster
Approach for MANET”, presented in 3rd
International Conference on Data Mining
ICDM - 2010, hosted by IMT Ghaziabad, University of Saskatachewan, Canada,
Nanyang Technological University, Singapore. Proc. published by Tata Mac Graw Hill
Publisher.
[2] Husain. Shahnawaz, S.C. Gupta, Ahmad Anzar,” Simulation & Comparison of
TORA & DSR Routing Protocol in MANET”, 6th National Conference on Information
Technology & Energy Management organized by GLA Group of Institution, Mathura,
India.
[3] Ahmad Anzar, Husain Shahnawaz, Chand Mukesh, SC Gupta, , ”ASSR Fair
Load Distribution Using Efficiency Division Factor with Greedy Booster Approach for
MANET”, presented in International conference ICT-2010, & proceeding published
with Springer CCIS. ISBN: 978-3-642-15766-0 (Indexed in ISI and DBLP), Doi:
10.1007/978-3-642-15766-0_112
URL: http://dx.doi.org/10.1007/978-3-642-15766-0_112
[4] Ahamd Anzar, Husain Shanawaz, S.C Gupta, “A Mechanism for Booster
Approach in Mobile Ad Hoc Network”, published in International Journal of Scientific
& Engineering Research Volume 2, Issue 6, June-2011; ISSN 2229-5518. Indexed in
Google Scholar, Ebsco, Scribd, DBLP, DOAJ, Scirate, Scirus, BASE, Citeseer, etc.
URL:
14
http://www.ijser.org/onlineResearchPaperViewer.aspx?A_Mechanism_for_Booster_Ap
proach_in_Mobile_Ad Hoc_Network.pdf
[5] Husain. Shahnawaz, S.C.Gupta, Ahmad Anzaar,” Simulation Study for
Performance Comparison of Routing Protocols In Mobile Adhoc Network”, published
in International Conference ICCSCN-2010 Singapore, published in issue 70, WASET
(World Academy of Science Engineering & Technology) an open access International
journal, eISSN 2010-3778. URL: http://www.waset.org/journals/waset/v70/v70-123.pdf
Shahnawaz Husain Prof.(Retd.)S.C.Gupta
(Research Scholar) (Research Guide)
Reg. No.: GEU (RES)/0074
Enrolment No.: GE 09570007