harmful/attack type of connections (Anup, 2010).
The algorithm takes into consideration different
features in network connections such as type of
protocol, network service on the destination and
status of the connection to generate a classification
rule set. For this experiment, they have implemented
a GA and trained it on the KDD Cup 99 data set to
generate a rule set that can be applied to the IDS to
identify and classify different types of attack
connections.
3 IDS, ROUTING AND ATTACK
Intrusion detection technologies focus on detecting
malicious activity typically from attackers that have
successfully penetrated the perimeter defences.
Based on the techniques used cross the security
barrier, IDS can be classified into three main
categories as follows:
i. Misuse Detection: In misuse detection, decisions
are made on the basis of earlier knowledge of the
intrusive process and what traces it might leave on
the observed system (Anjum, 2007). Such a system
tries to detect intrusion irrespective of any
knowledge regarding the background traffic. There
are several approaches in the signature detection,
which differ in representation and matching
algorithms employed to detect the intrusion patterns.
ii. Anomaly Detection: This technique establishes a
“normal activity profile” for a system and flags
observed activities that abnormally deviate from the
recognized normal usage as anomalies. It must first
be trained using normal data before it can be
released in an operative detection mode. The main
advantage of this model is that it can detect
unknown attacks. On the other hand, its
disadvantage is that it has high false positive alarm
rate when normal user profiles, operating system, or
network behavior vary widely from their normal
behavior.
iii. Specification-based detection: Specification-
based detection defines a set of constraints that
describe the correct operation of a protocol, and
monitors the execution of protocol with respect to
the defined constraints. This technique may provide
the capability to detect previously unknown attacks,
while exhibiting a low false positive rate.
The Ad hoc on demand distance vector routing
protocol (AODV) is a popular unicast routing
protocol that provides quick and efficient route
establishment between nodes desiring
communication with minimal control overhead and
minimal route acquisition delay (Sivaram, 2007).
Route discovery with AODV is purely on demand
and follows a route request/ route reply discovery
cycle. Requests are sent using a Route Request
(RREQ) message. Information enabling the creation
of a route is sent back in a Route Reply message
(RREP). In case where the source node receives
multiple RREP messages, it will select a RREP
message with the largest destination sequence
number value.
AODV is efficient and scalable in terms of
network performance, but it allows attackers to
easily advertise falsified route information to
redirect routes and to launch various kinds of
attacks. In each AODV routing packet, some critical
fields such as hop count, sequence numbers of
source and destination, and RREQ ID, are essential
to the correct protocol execution. Any misuse of
these fields can cause AODV to malfunction.
One such is misuse is the black hole attack which
targets on tampering the hop count and sequence
number fields. A node, which poses this attack,
changes the hop count value to 1 and the destination
sequence number to the largest value. This makes
the attacking node to be selected in the route
discovery process. The black hole node then
participates in the communication from source to
destination. When it receives packets from source, it
does not forward them to the intended destination;
instead, it drops them, thus disrupting the network
operation.
In this paper, the anomaly and specification
based techniques are combined, and tested on
networks that operate on AODV to detect black hole
attacking nodes, by making use of the advantages of
the two techniques to improve the detection rate.
4 SOFT COMPUTING BASED IDS
Soft computing is a multidisciplinary system defined
as the fusion of fields of Fuzzy logic, neuro
computing, genetic computing and probabilistic
computing. Soft computing is designed to model and
enable solutions for real world problems, which are
difficult to do using mathematical techniques.
Fuzzy inference is the process of formulating the
mapping from a given input to an output using fuzzy
logic. The mapping then provides a basis from
which decisions can be made, or patterns discerned.
Fuzzy inference systems have been successfully
applied in data classification, decision analysis, and
expert systems. There are two types of Fuzzy
Inference Systems (FIS):
WINSYS 2012 - International Conference on Wireless Information Networks and Systems
284