+ All Categories
Home > Documents > Synopsis

Synopsis

Date post: 26-Oct-2014
Category:
Upload: syedshahnawazhusain
View: 38 times
Download: 3 times
Share this document with a friend
Popular Tags:
14
1 1. Introduction An Adhoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Two important properties of an Adhoc network are that it is self-organized and adaptive. The absence of a fixed infrastructure requires mobile hosts in MANETs to cooperate with each other for message transmissions. To form such a cooperative self-configurable environment, every mobile node is supposed to be a friendly node and is willing to relay messages for others to their ultimate destinations. Global trustworthiness in all network nodes is the main fundamental security assumption in MANETs. Adhoc wireless networks inherited the traditional problem of wireless and mobile communication, such as band width optimization, power control and transmission quality enhancement [1]. In addition topology is highly dynamic & random & very hard to predict. Physical security is limited. Detecting malicious nodes in Adhoc network in which participating nodes have no previous security association’s presents a number of challenges not faced by traditional wired networks. The major issues irrespective of traditional wireless system, are given as Highly Dynamic Topology Routing in Mobile Adhoc Network Security in Mobile Adhoc Network IP Configuration in Mobile Adhoc Network Battery Backup Problem Intrusion detection is a security technology that attempts to identify individuals who are trying to break into and misuse a system without authorization and those who have legitimate access to the system but are abusing their privileges [2]. The system protected is used to denote an information system being monitored by an intrusion detection system. It can be a host or network equipment, such as a server, a firewall, a router, or a corporate network, etc [3]. In MANETs, intrusion prevention and intrusion detection techniques need to complement each other to guarantee a highly secure environment. They play different roles in different status of the network. Intrusion prevention measures, such as encryption and authentication, are more useful in preventing outside attacks. Once the
Transcript
Page 1: Synopsis

1

1. Introduction

An Adhoc network is a collection of nodes that are capable to form dynamically a

temporary network without the support of any centralized fixed infrastructure. Two

important properties of an Adhoc network are that it is self-organized and adaptive. The

absence of a fixed infrastructure requires mobile hosts in MANETs to cooperate with

each other for message transmissions. To form such a cooperative self-configurable

environment, every mobile node is supposed to be a friendly node and is willing to relay

messages for others to their ultimate destinations. Global trustworthiness in all network

nodes is the main fundamental security assumption in MANETs.

Adhoc wireless networks inherited the traditional problem of wireless and mobile

communication, such as band width optimization, power control and transmission

quality enhancement [1]. In addition topology is highly dynamic & random & very hard

to predict. Physical security is limited. Detecting malicious nodes in Adhoc network in

which participating nodes have no previous security association’s presents a number of

challenges not faced by traditional wired networks. The major issues irrespective of

traditional wireless system, are given as

• Highly Dynamic Topology

• Routing in Mobile Adhoc Network

• Security in Mobile Adhoc Network

• IP Configuration in Mobile Adhoc Network

• Battery Backup Problem

Intrusion detection is a security technology that attempts to identify individuals who

are trying to break into and misuse a system without authorization and those who have

legitimate access to the system but are abusing their privileges [2]. The system

protected is used to denote an information system being monitored by an intrusion

detection system. It can be a host or network equipment, such as a server, a firewall, a

router, or a corporate network, etc [3].

In MANETs, intrusion prevention and intrusion detection techniques need to

complement each other to guarantee a highly secure environment. They play different

roles in different status of the network. Intrusion prevention measures, such as

encryption and authentication, are more useful in preventing outside attacks. Once the

Page 2: Synopsis

2

node is compromised, however, intrusion prevention measures will have little effect in

protecting the network. Therefore, Intrusion Detection Systems (IDSs), serving as the

second line of defence for Adhoc Network.

2. Motivation

Research on IDSs began with a report by Anderson [4] followed by Denning’s

seminal paper [5], which lays the foundation for most of the current intrusion detection

prototypes. Since then, many research efforts have been devoted to wired network IDSs.

Numerous detection techniques and architecture for host machines and wired networks

have been proposed. A good taxonomy of wired IDSs is presented in [3].

Mobile Adhoc Network IDS is categorized as Incentive Based approaches and

Reputation based approach. And reputation based approaches are punishing the intruder

nodes whereas incentive based approach foster the positive behaviour of the node. A lot

of research work is done in each phase but no one is perfect and able to provide the

complete solutions for MANET IDS. For Incentive based approaches models and

algorithms are proposed by Zhang et al. [6], Huang et. Al [7], Bhargava and Agrawal

[8], Bal Krishnan [9], Razak et. Al [10] Abusalah et. Al [11] Pirzada et. Al [12], Yan et.

Al [13], Eschenauer et. Al [14], Mahmoud et. Al [15], Ping Y. et. Al [16], Komninos N.

[17], & Ramachandran , C. et. Al [18]. All of them provided very good solution but

each one has its own limitations like model is limited only for misuse detection, rules

are very brief, model is routing protocols dependent, most of them are conceptual model

and no statistics are considered, dependent on geography and mobility, centralized

architecture is needed. Some models/ algorithms are not IDS but proposal for only

reliable routing, and detect specific kind of attacks.

For Reputation based schemes also lot of research work is done, including Song et.

Al [19], Yan et. Al [20], Mundinger J. et. Al [21], Subhadrabandhu, D. et. Al [22],

Perich, F. et. Al [23], Haiyun Luo et Al. [24], Madhavi et. Al [25], Rebahi, Y. et Al.

[26]. Each scheme has its own advantages and disadvantages also. Most of them are

based on Watchdog mechanism but it is helpful when we have one or two compromised

node in the network. If number increased more than that then this schemes fails and also

reputation based scheme punishes the node and boycott it for further communication.

Adhoc environment is based on friendly atmosphere and chances of false positive are

Page 3: Synopsis

3

very high and if we are punishing the node forever then network will be destroyed

automatically.

So for this research we will use incentive based schemes and try to resolve the

limitation imposed by the previous research and identified certain Rules of Thumb for

preceding the work further.

2.1 Rules of Thumb for Intrusion Detection System in Adhoc

Environment

1. It should be Platform Independent & Geographical independent.

2. No Restriction over mobility while designing and during deployment of IDS.

3. IDS for MANET should not be Routing Protocol dependent.

4. It should be Light Weighted and Fast Responsive.

5. Reduced False Alarm and high number of True Positive.

6. No overhead while number of nodes increases (It should be easy to adapt

scalability).

7. Not only to prevent specific kind of attacks and allows the attack which are not

defined in definitions of attacks.

8. Suitable Deployment of IDS in layered Architecture.

9. A node should not be declared permanently as an Intruder.

10. Never rely on decision of single node, Fair Voting mechanism should be there

while declaring a node as intruder.

Page 4: Synopsis

4

3. Statement of the Problem

It is very challenging to design an intrusion detection system for mobile ad-hoc net-

works. The lack of fixed infrastructures and monitoring points make it difficult to

collect audit data for the entire network. MANET’s scared resources should be

considered while designing the IDS framework. In MANET it is more difficult to

distinguish between false alarms and real intrusions.

Main objective of the research is to design the Intrusion Detection Framework for

Intrusion Detection System in mobile Adhoc environment. This problem can be divided

into following sub problems.

3.1 To Design Light Weighted Intrusion Detection Framework For Mobile

Adhoc Environment.

3.2 To Construct Detection Engine Based On The Statistical Security Features

3.3 To Evaluate The Performance Of The MANET Intrusion Detection System

& Validate The Work.

4. Description of the Research work

a. Problem Definition

The first question in intrusion detection research is what statistical features of interest

should be used to construct the model. In the history, short sequences of system calls

used by privileged processes can be used to effectively distinguish normal and intrusive

behaviour and utilized to construct host based IDSs. Tcpdump data may be used to

construct detection engine for attacks possible using TCP Segment Header. However

Adhoc Network is in its premature stage and no application is designed to use the

services of TCP protocol till date. But, likely to be designed in future and most probable

solution for Attacks using TCP Segment is described and important Friend Features are

used to detect the Intruder and normal node. Model File is generated which could be

used for predicting the behaviour of the node.

By collecting the statistical features of interest based on the experimental results, to

identify the malicious and normal node for Denial of Service attack, Black Hole Attack

Page 5: Synopsis

5

and worm hole attacks for Network Layer, attacks are not limited there subcategory

included packet drops, delay in packet transmission, cache poisoning and selfishness.

The performance of the system is obtained with and without attacks and describes that if

there is only one malicious node then how much extent it can disturb the network.

Except the TCP segment header based attack rest of the simulation will be carried out in

approximately real scenario, as we know that the main contribution of the Adhoc

network is towards the military application hence in maximum cases number of nodes

may be limited that’s why we take only 21 nodes and there speed will vary from (0-20)

m/sec which is logically acceptable and trajectory they will follow a random trajectory

likely to be similar to the real environment. However research is not limiting to the

scalability or number of malicious or trusted node. In this research we have applied only

one malicious node and collected the statistics for that node. If number of malicious

nodes will increase then it has no impact on research because in this designing of

detection system, whatever the number of trusted or malicious node present in the

network.

b. Research Methodology

After extensive research and analysis, we have decided to take Opnet Modeler for

running the simulation for different kind of attacks and measuring the performance with

and without attack, then data generated by the simulation is collected and features are

identified for attacks and rule set are designed then for training and testing the data set

SVM LIGHT

is used, which is best among the ANN and other mining tools [27], [28],

[29], [30], [31], & [32].

Hence for Network Simulation

Opnet Modeler (Version 14.0 and above)

For classification and Prediction (Data Mining Tools)

SVMLIGHT

; used binary classification.

5. Proposed Contents of the Thesis

It is very difficult to design a once-for-all intrusion detection system. Instead an

incremental enhancement strategy may be more feasible. A secure protocol should at

least include mechanisms against known attack types. In addition, it should provide a

scheme to easily add new security features in the future. The general methodology is:

we first identify the attacks possible in Adhoc Environment then develop framework to

facilitate the cooperation of IDS and design of detection engines using statistics

Page 6: Synopsis

6

collected for known attack types. The whole dissertation is organized as follows.

Chapter II, summarizes the related work which has been done in wired and wireless

intrusion detection systems. We further introduce a few important existing prototypes

and detection algorithms for Mobile Adhoc Networks, and demonstrate that very few

research efforts have been devoted to MANET IDSs. On behalf of the literature review

we identify Research Gap and rules of thumb for Adhoc Network. Note that the

research described in this dissertation only focuses on the detection part, although

intrusion response component is necessary in the system.

In Chapter III, we proposed the prototype model which we will use for further

Intrusion Detection System; In this we divided the model in two modules Local IDS and

Global IDS, local ids will work on the data collected from the network and identify the

friend list for first phase, these friend list are again tested in Global IDS module for

rigorous checking, before declaring a node as friend or intruder Gids will use the voting

mechanism. In this chapter we will discuss the tools used for simulation to extract the

features and statistics to design the detection engine.

In Chapter IV, attacks applied to the network using TCP segment header and collect

the result to design the detection engine for Transport layer, training and testing of data

set to design the detection engine and to check the accuracy of the detection system.

However, it is not necessary in this dissertation but it will provide the new directions in

the field of security for Mobile Adhoc Network.

In Chapter V, Denial of Service attack applied to the network layer of Adhoc

Network, evidences are collected to design intrusion detection engine specifically to

defend against Denial of Service attacks. Feature extraction and induction of rule sets

from the statistics collected, and applied to design detection engine, support vector

machine is used to check the accuracy of the detection engine.

In Chapter VI, Black Hole and Worm Hole attacks are applied to the Adhoc Network.

Evidences are collected, features are extracted and rules are inducted to design intrusion

detection engine specifically to defend against Black Hole attacks for MANET Intrusion

Detection System (IDS). Support Vector Machine is used for training and testing the

data set and checking the accuracy of the model file generated which will be used to

deploy for detection engine.

Page 7: Synopsis

7

Chapter VII concluded this dissertation and lists important future work. Because not

many research efforts have been devoted to MANET IDSs, this research only provides

the initial effort in constructing a viable and statistical based MANET IDS.

6. Conclusion

This research describes a Cooperative Friend Features based Intrusion Detection

System for mobile ad-hoc networks. It consists of the detailed description of the local

IDS and the Global IDS based framework for the IDS. They complement each other to

make complete intrusion detection system for MANETs. Because of the importance of

routing protocols in MANETs, we implemented and carried out the simulation using

Reactive based routing because it is best suited for Adhoc Environment but research can

be carried out using proactive based routing also.

Model is designed for MAC Layer as well as Network Layer based Intrusion detection

system, but we implemented it only for Network Layer i.e. Anomaly based Intrusion

detection system.

7. References

[1] Chakrabarti, S.; Mishra, A.; , "QoS issues in ad hoc wireless networks," Communications

Magazine, IEEE , vol.39, no.2, pp.142-148, Feb 2001, doi: 10.1109/35.900643

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=900643&isnumber=19494

[2] Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Grance, T.; Heberlein, L.T.; Ho, C.-L.;

Levitt, K.N.; Mukherjee, B.; Mansur, D.L.; Pon, K.L.; Smaha, S.E.; , "A system for

distributed intrusion detection," Compcon Spring '91. Digest of Papers , vol., no., pp.170-

176, 25 Feb-1 Mar 1991, doi: 10.1109/CMPCON.1991.128802

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=128802&isnumber=3600

[3] H. Debar, M. Dacier, and A.Wespi, “A Revised Taxonomy for Intrusion Detection

Systems,” Annales of Telecommunications, vol. 55, pp. 361-378, 01July, 2000 Springer Paris

ISSN- 0003-4347. doi: 10.1007/BF02994844

URL: http://www.springerlink.com/content/4xq65ng0l0801626/

[4] J. P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical Report,

James P. Anderson Co., Fort Washington, PA, April, 1980.

Page 8: Synopsis

8

[5] Denning, D.E.; , "An Intrusion-Detection Model," IEEE Transactions on Software

Engineering, , vol.SE-13, no.2, pp. 222- 232, Feb. 1987, doi: 10.1109/TSE.1987.232894

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1702202&isnumber=35884

[6] Yongguang Zhang and Wenke Lee. 2000. Intrusion detection in wireless ad-hoc networks. In

Proceedings of the 6th annual international conference on Mobile computing and networking

(MobiCom '00). ACM, New York, NY, USA, 275-283. DOI=10.1145/345910.345958.

URL: http://doi.acm.org/10.1145/345910.345958

[7] Yi-an Huang and Wenke Lee. 2003. A cooperative intrusion detection system for ad hoc

networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor

networks (SASN '03). ACM, New York, NY, USA, 135-147. DOI=10.1145/986858.986877

URL: http://doi.acm.org/10.1145/986858.986877

[8] Bhargava, S.; Agrawal, D.P. , "Security enhancements in AODV protocol for wireless ad

hoc networks ," Vehicular Technology Conference, 2001. VTC 2001 Fall. IEEE VTS 54th,

vol.4, no., pp.2143-2147 vol.4, 2001, doi: 10.1109/VTC.2001.957123

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=957123&isnumber=20686

[9] Balakrishnan, K.; Jing Deng; Varshney, V.K.; , "TWOACK: preventing selfishness in

mobile ad hoc networks," Wireless Communications and Networking Conference, 2005

IEEE , vol.4, no., pp. 2137- 2142 Vol. 4, 13-17 March, 2005, doi:

10.1109/WCNC.2005.1424848

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1424848&isnumber=30731

[10] Razak, S.A., Furnell, S., Clarke, N. Brooke, P. Mehrotra, Sharad. Zeng, Daniel, Chen,

Hsinchun. Thuraisingham, Bhavani. “A Two-Tier Intrusion Detection System for Mobile

Ad Hoc Networks--A Friend Approach”, Lecture Notes In Computer Science, volume 3975,

pp. 590-595, 2006, Springer Berlin / Heidelberg. doi: 10.1007/11760146_62

URL: http://dx.doi.org/10.1007/11760146_62

[11] Abusalah, L.; Khokhar, A.; Guizani, M.; , "NIS01-4: Trust Aware Routing in Mobile Ad

Hoc Networks," Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE,

vol., no., pp.1-5, Nov. 27 Dec.1, 2006, doi:10.1109/GLOCOM.2006.264;

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4150894&isnumber=4150630

Page 9: Synopsis

9

[12] Pirzada, A. A and McDonald, C. “Establishing Trust in Pure Ad-Hoc Networks”. In

Proceedings of the 27th Australasian Computer Science Conference (ACSC’04), Dunedin,

New Zealand, vol 26, pp. 47-54, 2004.

URL: http://portal.acm.org/citation.cfm?id=979929

[13] Yan, Z., Zhang, P. and Virtanen, T. "Trust Evaluation Based Security Solution in Ad Hoc

Networks". In Proceedings of the 7th Nordic Workshop on Secure IT Systems, NordSec

2003, Gjovik, Norway, pp. 1-14. URL:

http://www.citmo.net/library/Trust_Evaluation_Based_Security_Solution_in_Ad_Hoc_Netw

orks.pdf

[14] Eschenauer, L. “On Trust Establishment in Mobile Ad-Hoc Networks,” Lecture Notes in

Computer Science, Volume: 2845, Year 2004, Springer Berlin / Heidelberg. Isbn: 978-3-

540-20830-3, Doi: 10.1007/978-3-540-39871-4_6

URL: http://dx.doi.org/10.1007/978-3-540-39871-4_6

URL:http://www.springerlink.com/content/97ge3hn0k6crcdht/

[15] Mahmoud, M.; Shen, X.; , "FESCIM: Fair, Efficient, and Secure Cooperation Incentive

Mechanism for Multi-hop Cellular Networks,", IEEE Transactions on Mobile Computing,

vol. PP, no.99, pp.1, 0, doi: 10.1109/TMC.2011.92

URL:

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5765975&isnumber=4358975

[16]Yi Ping, Zou Futai, Jiang Xinghao, Li Jianhua, Multi-agent cooperative intrusion response

in mobile adhoc networks, Journal of Systems Engineering and Electronics, Volume 18,

Issue 4, December 2007, Pages 785-794, ISSN 1004-4132, 10.1016/S1004-4132(08)60021-

3.

URL: http://www.sciencedirect.com/science/article/pii/S1004413208600213

[17] Nikos Komninos, Dimitris Vergados, Christos Douligeris, Detecting unauthorized and

compromised nodes in mobile ad hoc networks, Ad Hoc Networks, Volume 5, Issue 3, April

2007, Pages 289-298, ISSN 1570-8705, 10.1016/j.adhoc.2005.11.005.

URL: http://www.sciencedirect.com/science/article/pii/S1570870505001113

[18] Chandrasekar Ramachandran, Sudip Misra, Mohammad S. Obaidat, FORK: A novel two-

pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks,

Computer Communications, Volume 31, Issue 16, 25 October 2008, Pages 3855-3869, ISSN

0140-3664, 10.1016/j.comcom.2008.04.012.

Page 10: Synopsis

10

URL: http://www.sciencedirect.com/science/article/pii/S0140366408002314

[19] Chengqi Song, Qian Zang,” OHM- Suppressing selfish behavior in adhoc networks with

one more hop” 5th International ICST Conference on Heterogeneous Networking for

Quality, Reliability, Security and Robustness, 2008, ISBN:978-963-9799-26-4.

URL: http://dl.acm.org/citation.cfm?id=1741551

[20] Yan, Z., Zhang, P. and Virtanen, T. "Trust Evaluation Based Security Solution in Ad Hoc

Networks". In Proceedings of the 7th Nordic Workshop on Secure IT Systems, NordSec

2003, Gjovik, Norway, pp. 1-14. URL:

http://www.citmo.net/library/Trust_Evaluation_Based_Security_Solution_in_Ad_Hoc_Netw

orks.pdf

[21] Jochen Mundinger, Jean-Yves Le Boudec, Analysis of a reputation system for Mobile Ad-

Hoc Networks with liars, Performance Evaluation, Volume 65, Issues 3-4, March 2008,

Pages 212-226, ISSN 0166-5316, 10.1016/j.peva.2007.05.004.

URL: http://www.sciencedirect.com/science/article/pii/S016653160700048X

[22] Subhadrabandhu, D.; Sarkar, S.; Anjum, F.; , "A framework for misuse detection in ad hoc

Networks-part I," Selected Areas in Communications, IEEE Journal on , vol.24, no.2, pp.

274- 289, Feb. 2006, doi: 10.1109/JSAC.2005.861387

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1589108&isnumber=33490

[23]Perich, F.; Undercoffer, J.; Kagal, L.; Joshi, A.; Finin, T.; Yesha, Y.; , "In reputation we

believe: query processing in mobile ad-hoc networks," Mobile and Ubiquitous Systems:

Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International

Conference on , vol., no., pp. 326- 334, 22-26 Aug. 2004, doi:

10.1109/MOBIQ.2004.1331739

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1331739&isnumber=29413

[24] Haiyun Luo; Jiejun Kong; Petros, Z.; Songwu Lu; Lixia Zhang; , "Providing robust and

ubiquitous security support for mobile ad-hoc networks," Network Protocols, 2001. Ninth

International Conference on , vol., no., pp.251-260, 14-14 Nov. 2001, doi:

10.1109/ICNP.2001.992905

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=992905&isnumber=21404

[25] Madhavi, S.; , "An Intrusion Detection System in Mobile AdHoc Networks," International

Conference on Information Security and Assurance, 2008. ISA 2008., vol., no., pp.7-14, 24-

26 April 2008, doi: 10.1109/ISA.2008.80

Page 11: Synopsis

11

URL:

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4511525&isnumber=4511515

[26] Rebahi, Y.; Mujica-V, V.E.; Sisalem, D.; , "A reputation-based trust mechanism for ad hoc

networks," 10th IEEE Symposium on Computers and Communications, 2005. ISCC 2005.

Proceedings. , pp. 37- 42, 27-30 June 2005, doi: 10.1109/ISCC.2005.17

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1493704&isnumber=32117

[27] Andrew H. Sung, Srinivas Mukkamala, ”Feature Selection for Intrusion Detection using

Neural Networks and Support Vector Machines”, Transport Research Record published by

TRB Journal 2003,Issue number 1822, ISSN: 0361-1981, pp 33-39. URL:

http://dx.doi.org/10.3141/1822-05

[28] Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Intrusion detection using an

ensemble of intelligent paradigms, Journal of Network and Computer Applications, Volume

28, Issue 2, April 2005, Pages 167-182, ISSN 1084-8045, 10.1016/j.jnca.2004.01.003.

(http://www.sciencedirect.com/science/article/pii/S1084804504000049)

[29] L.V. Ganyun, Cheng Haozhong, Zhai Haibao, Dong Lixin, Fault diagnosis of power

transformer based on multi-layer SVM classifier, Electric Power Systems Research, Volume

74, Issue 1, April 2005, Pages 1-7, ISSN 0378-7796, 10.1016/j.epsr.2004.07.008.

(http://www.sciencedirect.com/science/article/pii/S0378779604001944)

[30] Emre Çomak, Ahmet Arslan, İbrahim Türkoğlu, A decision support system based on

support vector machines for diagnosis of the heart valve diseases, Computers in Biology and

Medicine, Volume 37, Issue 1, January 2007, Pages 21-27, ISSN 0010-4825,

10.1016/j.compbiomed.2005.11.002.

(http://www.sciencedirect.com/science/article/pii/S0010482505001484)

[31] Shang-Ming Zhou; Gan, J.Q.; , "Constructing L2-SVM-Based Fuzzy Classifiers in

High-Dimensional Space With Automatic Model Selection and Fuzzy Rule Ranking," Fuzzy

Systems, IEEE Transactions on , vol.15, no.3, pp.398-409, June 2007, doi:

10.1109/TFUZZ.2006.882464

URL:

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4231867&isnumber=4231848

[32] Jung-Hsien Chiang; Pei-Yi Hao; , "Support vector learning mechanism for fuzzy rule-

based modeling: a new approach," Fuzzy Systems, IEEE Transactions on , vol.12, no.1, pp.

1- 12, Feb. 2004, doi: 10.1109/TFUZZ.2003.817839

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1266382&isnumber=28327

Page 12: Synopsis

12

8. List of Publication Based on Research Work

Journals:

[1] Husain Shahnawaz, Gupta S.C., "Friend Features Extraction to Design Detection

Engine for Intrusion Detection System in Mobile Adhoc Network", Communicated in

International Journal of Computer Science & Information Technology, ISSN 0975-

9646, Vol (2) Issue 4, 2011, indexed in Google Scholor, Open J Gate, Cabell

Publishing, Index Copernicus.

U.R.L http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020440.pdf

Citation Rate: Cited by 2

[2] Husain S.; Gupta, S.C.; , “Black Hole Attack in AODV & Friend Features

Extraction to Design Detection Engine for Intrusion Detection System in Mobile Adhoc

Network”, accepted for publication in Journal of Engineering Science and Technology

(JESTEC) in vol. 7 issue 5 October 2012, an open access peer reviewed journal ;

ISSN : 1823-4690. Indexed in Scopus. URL: http://jestec.taylors.edu.my/

International Conferences:

[1] Husain, S.; Gupta, S.C.; , "A proposed model for Intrusion Detection System for

mobile adhoc network," Computer and Communication Technology (ICCCT), 2010

International Conference on , pp. 99-102, 17-19 Sept. 2010, doi:

10.1109/ICCCT.2010.5640420

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5640420&isnumber=5

640373

URL for Scopus: http://www.scopus.com/inward/record.url?eid=2-s2. 08650556940

&partnerID =40&md5=a87b99b547c8abd7a05d04e0407e875b

Citation Rate: Cited by 3

[2] Husain Shahnawaz,; Gupta, S. C.;, "Denial of Service attack in AODV & friend

features extraction to design detection engine for intrusion detection system in Mobile

Adhoc Network," Computer and Communication Technology (ICCCT), 2011 2nd

International Conference on , vol., no., pp.292-297, 15-17 Sept. 2011, doi:

10.1109/ICCCT.2011.6075162

Page 13: Synopsis

13

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6075162&isnumber=6

075092

ScopusURL:http://www.scopus.com/inward/record.url?eid=2-s2.0-

82955227957&partnerID=40&md5=56547f7563113d1108a2236767447afe

Citation Rate: cited by 1

Communicated:

[1] Husain S.; Gupta, S.C.; , “Worm Hole Attack in AODV & Friend Features

Extraction to Design Detection Engine for Intrusion Detection System in Mobile Adhoc

Network”, communicated in International Journal of Adhoc Network published by

Elsevier, ISSN : 1570-8705.

Other papers Published: (Included in Introduction)

[1] Husain. Shahnawaz, S.C Gupta,” A Fair Load Distribution with Greedy Booster

Approach for MANET”, presented in 3rd

International Conference on Data Mining

ICDM - 2010, hosted by IMT Ghaziabad, University of Saskatachewan, Canada,

Nanyang Technological University, Singapore. Proc. published by Tata Mac Graw Hill

Publisher.

[2] Husain. Shahnawaz, S.C. Gupta, Ahmad Anzar,” Simulation & Comparison of

TORA & DSR Routing Protocol in MANET”, 6th National Conference on Information

Technology & Energy Management organized by GLA Group of Institution, Mathura,

India.

[3] Ahmad Anzar, Husain Shahnawaz, Chand Mukesh, SC Gupta, , ”ASSR Fair

Load Distribution Using Efficiency Division Factor with Greedy Booster Approach for

MANET”, presented in International conference ICT-2010, & proceeding published

with Springer CCIS. ISBN: 978-3-642-15766-0 (Indexed in ISI and DBLP), Doi:

10.1007/978-3-642-15766-0_112

URL: http://dx.doi.org/10.1007/978-3-642-15766-0_112

[4] Ahamd Anzar, Husain Shanawaz, S.C Gupta, “A Mechanism for Booster

Approach in Mobile Ad Hoc Network”, published in International Journal of Scientific

& Engineering Research Volume 2, Issue 6, June-2011; ISSN 2229-5518. Indexed in

Google Scholar, Ebsco, Scribd, DBLP, DOAJ, Scirate, Scirus, BASE, Citeseer, etc.

URL:

Page 14: Synopsis

14

http://www.ijser.org/onlineResearchPaperViewer.aspx?A_Mechanism_for_Booster_Ap

proach_in_Mobile_Ad Hoc_Network.pdf

[5] Husain. Shahnawaz, S.C.Gupta, Ahmad Anzaar,” Simulation Study for

Performance Comparison of Routing Protocols In Mobile Adhoc Network”, published

in International Conference ICCSCN-2010 Singapore, published in issue 70, WASET

(World Academy of Science Engineering & Technology) an open access International

journal, eISSN 2010-3778. URL: http://www.waset.org/journals/waset/v70/v70-123.pdf

Shahnawaz Husain Prof.(Retd.)S.C.Gupta

(Research Scholar) (Research Guide)

Reg. No.: GEU (RES)/0074

Enrolment No.: GE 09570007


Recommended