ATTACKS DURING INTRUSION REALIZATION IN THE MANET MOBILE RADIONETWORKS

Serhii V. Salnyk

Abstract


In the article the analysis of existent attacks is conducted which are used for intrusion in the MANET. Classification of category and types of intrusions, also the variants of their influence are found out on a mobile radio network on the different levels of network model of OSI is realized. Possibility of the intrusions is considered during organization of studies on the basis of teaching great number intrusions and construction methods of detection intrusions. The list of parameters that intrusions are characterized in a mobile radio network are also considered. The list of requirements to methods of detection of intrusions for their application in a mobile radio network is defined. Directions of construction modern methods of finding out intrusions offe r in mobile radio networks on the basis of neural networks at the use in the conditions of unclear network activity with the purpose providing of safety network are proposed. The direction of further researches is also determined.

Keywords


security mobile radio network; system of detection of invasions; invasion into a network; attack.

References


Romanyuk V.A. (2003), The mobile radio network - wireless technology prospects. [Mobilnyie radioseti – perspektivyi bezprovodnyih tehnologiy], Seti i telekommunikatsii, No 12, рр. 62–68.

Minochkin A.I., Romanyuk V.A., Shatsilo P.V. (2005), Attack detection in mobile radio networks. [Viyavlennya atak v mobilnyih radiomerezhah], Zbirnyik naukovih prats VITI NTUU “KPI”, No 1 рр. 102–111.

Platonov V.V. (2013), Hardware and software data protection. [Programmno - apparatnyie sredstva zaschityi informatsii], Moscow: izdatelskiy tsentr “Akademiya”, 336 р.

Proletarskiy A.V., Baskakov I.V., Chirkov D.N. (2013), Wireless networks WI-FI. [Besprovodnyie seti WI-FI], uchebnoe posobie, Binom. Laboratoriya znaniy, 216 р.

Salnik S.V., Sova O.Y., Minochkin D.А. Analysis methods for intrusion detection in mobile radio class MANET [Analiz metodov obnaruzheniya vtorzheniy v mobil'nyye radioseti klassa MANET], nauchnyy zhurnal “Sovremennyye informatsionnyye tekhnologii v sfere bezopasnosti i oborony “ No 1 (22) 2015, Moscow: Natsional'nyy universitet oborony Ukrainy , 2015 pp. 103- 112.

Lukatskiy A.V, (2003) Attack detection. [Obnaruzhenie atak], 2nd edition, SPb.: BHV Peterburg.

KDD Cup 1999 Data / The UCI KDD Archive, Information and Computer Science. – University of California, Irvine, 1999.

S. Akbar, K.Nageswara Rao, J.A.Chandulal. (2010) “Intrusion Detection System Methodologies Based on Data Analysis.” International Journal of Computer Applications (0975 – 8887), Volume 5, No.2.

Vasilyev V.I., Sarabyrov I.V., (2012) attack detection in wireless local area networks based on data mining, Izvestiya YuFU. pp. 57-66.

Komar M. P., Bodnar D. I., Sachenko A.O. (2010) Intelligent information technology of exposure of computer attacks VimIryuvalna ta obchislyuvalna tehnIka v tehnologIchnih protsesah, No 2. pp. 133-137.

Merit M., Polino D. (2004) Wireless Security. [Bezopasnost besprovodnyih setey], Moscow: DMK Press, p 288.

Yahui Yang, Dianbo Jiang, Min Xia (2010) Using Improved GHSOM for Intrusion Detection, Journal of Information Assurance and Security 5, pp. 232- 239.

Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, Ajith Abraham (2010) Principle Components Analysis and Support Vector Machine based Intrusion Detection System, 10th International Conference on Intelligent Systems Design and Applications, pp. 363-367.

H. Alipour, E. Khosrowshahi, M. Esmaeili, M. Nourhossein. (2008) ACOFCR: applying ACO-based algorithms to induct FCR. In: Proceedings of the World Congress on Engineering (IWCE), pp. 12-17.

W. S. Sharafat, R. Naoum, (2009) Development of Genetic-based Machine Learning for Network Intrusion Detection GBML-NID).World Academy of Science, Engineering and Technology, pp. 20-24.

MS. Abadeh, J. Habibi, (2010) A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. The ISC International Journal of Information Security, No 2(1), pp. 33-46.


GOST Style Citations


Романюк В. А. Мобильные радиосети - перспективы беспроводных технологий / Сети и телекоммуникации, 2003. № 12. С. 62-68.

Міночкін А. І., Романюк В. А., Шацило П. В. Виявлення атак в мобільних радіомережах / Збірник наукових праць № 1. – К.: ВІТІ НТУУ “КПІ”, 2005. С. 102-111.

Платонов В. В. Программно- аппаратные средства защиты информации: учебник для студ. учреждений высш. проф. образования / В. В. Платонов. - М.: издательский центр “Академия”, 2013.- 336 с.

Пролетарский А. В., Баскаков И. В., Чирков Д. Н. Беспроводные сети WI-FI: учебное пособие. - Москва: Интернет - университет информационных технологий, Бином. Лаборатория знаний , 2013. - 216 с.

Сальник С. В., Сова О. Я., Міночкін Д. А. Аналіз методів виявлення вторгнень у мобільні радіомережі класу MANET // науковий журнал “Сучасні інформаційні технології у сфері безпеки та оборони” № 1(22)2015 – К.: Національний університет оборони України імені Івана Черняховського, 2015. С. 103-112.

Лукацкий А. В. Обнаружение атак. 2-е изд., – СПб.: БХВ-Петербург, 2003.

KDD Cup 1999 Data / The UCI KDD Archive, Information and Computer Science. – University of California, Irvine, 1999.

S. Akbar, K.Nageswara Rao, J.A.Chandulal. “Intrusion Detection System Methodologies Based on Data Analysis.” International Journal of Computer Applications (0975 – 8887), Volume 5– No.2, August 2010.

Васильев В. И., Шарабыров И. В., Обнаружение атак в локальных беспроводных сетях на основе интеллектуального анализа даннях / Известия ЮФУ. 2012. С. 57-66.

Комар М. П., Боднар Д. І., Саченко А. О. Інтелектуалізована інформаційна технологія виявлення комп’ютерних атак / Вимірювальна та обчислювальна техніка в технологічних процесах. 2010. – № 2. С. 133- 137.

Меріт М., Полино Д. Безопасность беспроводных сетей. – М.: ДМК Пресс, 2004, 288 с.

Yahui Yang, Dianbo Jiang, Min Xia Using Improved GHSOM for Intrusion Detection, Journal of Information Assurance and Security 5, 2010, 232-239.

Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, Ajith Abraham, Principle Components Analysis and Support Vector Machine based Intrusion Detection System, 10th International Conference on Intelligent Systems Design and Applications, 2010, 363-367.

H. Alipour, E. Khosrowshahi, M. Esmaeili, M. Nourhossein. ACOFCR: applying ACO-based algorithms to induct FCR. In: Proceedings of the World Congress on Engineering (IWCE), 2008, 12-17.

W. S. Sharafat, R. Naoum, Development of Genetic-based Machine Learning for Network Intrusion Detection GBML-NID).World Academy of Science, Engineering and Technology, 2009, pp. 20-24.

MS. Abadeh, J. Habibi, A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. The ISC International Journal of Information Security 2010, 2(1):33-46.



Refbacks

  • There are currently no refbacks.


ISSN 2410-7336 (Online)

ISSN 2311-7249 (Print)