ATTACKS DURING INTRUSION REALIZATION IN THE MANET MOBILE RADIONETWORKS
Keywords:security mobile radio network, system of detection of invasions, invasion into a network, attack.
AbstractIn the article the analysis of existent attacks is conducted which are used for intrusion in the MANET. Classification of category and types of intrusions, also the variants of their influence are found out on a mobile radio network on the different levels of network model of OSI is realized. Possibility of the intrusions is considered during organization of studies on the basis of teaching great number intrusions and construction methods of detection intrusions. The list of parameters that intrusions are characterized in a mobile radio network are also considered. The list of requirements to methods of detection of intrusions for their application in a mobile radio network is defined. Directions of construction modern methods of finding out intrusions offe r in mobile radio networks on the basis of neural networks at the use in the conditions of unclear network activity with the purpose providing of safety network are proposed. The direction of further researches is also determined.
Romanyuk V.A. (2003), The mobile radio network - wireless technology prospects. [Mobilnyie radioseti – perspektivyi bezprovodnyih tehnologiy], Seti i telekommunikatsii, No 12, рр. 62–68.
Minochkin A.I., Romanyuk V.A., Shatsilo P.V. (2005), Attack detection in mobile radio networks. [Viyavlennya atak v mobilnyih radiomerezhah], Zbirnyik naukovih prats VITI NTUU “KPI”, No 1 рр. 102–111.
Platonov V.V. (2013), Hardware and software data protection. [Programmno - apparatnyie sredstva zaschityi informatsii], Moscow: izdatelskiy tsentr “Akademiya”, 336 р.
Proletarskiy A.V., Baskakov I.V., Chirkov D.N. (2013), Wireless networks WI-FI. [Besprovodnyie seti WI-FI], uchebnoe posobie, Binom. Laboratoriya znaniy, 216 р.
Salnik S.V., Sova O.Y., Minochkin D.А. Analysis methods for intrusion detection in mobile radio class MANET [Analiz metodov obnaruzheniya vtorzheniy v mobil'nyye radioseti klassa MANET], nauchnyy zhurnal “Sovremennyye informatsionnyye tekhnologii v sfere bezopasnosti i oborony “ No 1 (22) 2015, Moscow: Natsional'nyy universitet oborony Ukrainy , 2015 pp. 103- 112.
Lukatskiy A.V, (2003) Attack detection. [Obnaruzhenie atak], 2nd edition, SPb.: BHV Peterburg.
KDD Cup 1999 Data / The UCI KDD Archive, Information and Computer Science. – University of California, Irvine, 1999.
S. Akbar, K.Nageswara Rao, J.A.Chandulal. (2010) “Intrusion Detection System Methodologies Based on Data Analysis.” International Journal of Computer Applications (0975 – 8887), Volume 5, No.2.
Vasilyev V.I., Sarabyrov I.V., (2012) attack detection in wireless local area networks based on data mining, Izvestiya YuFU. pp. 57-66.
Komar M. P., Bodnar D. I., Sachenko A.O. (2010) Intelligent information technology of exposure of computer attacks VimIryuvalna ta obchislyuvalna tehnIka v tehnologIchnih protsesah, No 2. pp. 133-137.
Merit M., Polino D. (2004) Wireless Security. [Bezopasnost besprovodnyih setey], Moscow: DMK Press, p 288.
Yahui Yang, Dianbo Jiang, Min Xia (2010) Using Improved GHSOM for Intrusion Detection, Journal of Information Assurance and Security 5, pp. 232- 239.
Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, Ajith Abraham (2010) Principle Components Analysis and Support Vector Machine based Intrusion Detection System, 10th International Conference on Intelligent Systems Design and Applications, pp. 363-367.
H. Alipour, E. Khosrowshahi, M. Esmaeili, M. Nourhossein. (2008) ACOFCR: applying ACO-based algorithms to induct FCR. In: Proceedings of the World Congress on Engineering (IWCE), pp. 12-17.
W. S. Sharafat, R. Naoum, (2009) Development of Genetic-based Machine Learning for Network Intrusion Detection GBML-NID).World Academy of Science, Engineering and Technology, pp. 20-24.
MS. Abadeh, J. Habibi, (2010) A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. The ISC International Journal of Information Security, No 2(1), pp. 33-46.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
4. Personal data and metadata contained in articles are available for storage and processing in various databases and information systems, including them in analytical and statistical reports, creating reasonable relationships of scientific , literary and art objects with personal data, etc. on an area which is not limited.