Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Debdutta Barman Roy is active.

Publication


Featured researches published by Debdutta Barman Roy.


Security and Communication Networks | 2010

BHIDS: a new, cluster based algorithm for black hole IDS

Debdutta Barman Roy; Rituparna Chaki; Nabendu Chaki

Mobile ad hoc networks (MANET) are highly vulnerable to attacks due to multiple factors including the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring. Besides slowing down the network, the traditional way of using firewalls and cryptography often fails to detect different types of attacks. The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. In this paper, we present a new, cluster based Black Hole Intrusion Detection System (BHIDS) for mobile, ad hoc networks. The features that are considered for BHIDS include mobility of nodes, variation in number of attacking nodes, packet delivery rate, density of the network, etc. The nodes in the network form a two-layered cluster. This helps splitting the processing and communication overhead between the cluster heads at Layer 1 and 2. The proposed IDS algorithm has been tested on a simulated network using the NS simulator. The performance graphs show marked improvement as far as packet dropping is concerned. Copyright


international conference on electronics computer technology | 2011

Prevention of sleep deprivation attacks using clustering

Manasi Sarkar; Debdutta Barman Roy

MANETs are highly vulnerable to attacks due to the open medium dynamically changing network topology, cooperative algorithm, lack of centralized monitoring and management point. The fact that security is a critical problem in implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is exhausting a node by consuming its battery power. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and limited battery-based energy some nodes may not cooperate correctly. In this paper an algorithm is proposed to prevent sleep deprivation attack. The proposed algorithm is based on clustering mechanism.


computer information systems and industrial management applications | 2011

MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System

Debdutta Barman Roy; Rituparna Chaki

A Mobile Ad Hoc Network (MANET) is a network built on ad hoc demand by some mobile wireless nodes geographically distributed over an area. There is no fixed infrastructure and also no centralized administration. The traditional security measures fail to provide the required security level in MANETs. Specialised detection schemes are to be employed for detecting the intruder attack in MANET. The intrusion detection systems based on mobile agents uses a set of mobile agents moving from one node to another node within a network. The distributed ID consists of multiple mobile agents which cooperate over a large network and communicate with each other. This as a whole reduces network bandwidth usage by moving data analysis computation to the location of the intrusion data & support heterogeneous platforms. In this paper, a mobile agent based IDS have been proposed to detect the black hole attack in MANET, with the aim of reducing computational complexity.


Archive | 2011

Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent

Debdutta Barman Roy; Rituparna Chaki

Mobile Adhoc Network (MANET) is highly vulnerable to malicious attacks due to infrastructure less network environment, be deficient in centralized authorization. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is selfishness. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and limited battery-based energy some nodes (i.e. selfish or malicious) may not cooperate correctly. There can be two types of selfish attacks –selfish node attack (saving own resources) and sleep deprivation (exhaust others’ resources. In this paper, we propose a new Mobile Agent Based Intrusion Detection System (IDS). The approach uses a set of Mobile Agent (MA) that can move from one node to another node within a network. This as a whole reduces network bandwidth consumption by moving the computation for data analysis to the location of the intrusion. Besides, it has been established that the proposed method also decreases the computation overhead in each node in the network.


International Journal of Computer Applications | 2012

BAIDS: Detection of Blackhole Attack in MANET by Specialized Mobile Agent

Debdutta Barman Roy; Rituparna Chaki

inbuilt flexibility along with easy set-up and low main- tenance cost causes MANETs to be increasingly useful in catastrophe management, battlefield surveillance; etc. The infrastructure-less performance of MANET has made it more vulnerable to intrusion than ever before making the security of network all the more acute. As the previously used security systems fail to protect the MANET from insider attacks, the need for an Intrusion Detection System (IDS) becomes evi- dent. IDS based on Mobile Agents is long been used for se- curing the MANET. The prior works seem to suffer from computational overhead leading to performance. This paper proposes a mobile agent based IDS in order to reduce the overheads. The use of distributed ID consists of multiple mobile agents which assist over a large network and to make communication with each other, or with a central server that provide advanced network monitoring, incident analysis, and instant attack data. This as a whole reduces the network bandwidth usage by moving data analysis computation to the place of the intrusion data & sustains on the heterogeneous platforms.


ieee india conference | 2013

MCBHIDS: Modified layered cluster based algorithm for black hole IDS

Debdutta Barman Roy; Rituparna Chaki

Mobile ad hoc networks are highly vulnerable to attacks due to infrastructure less environment. The features of MANETs are like open media, dynamic changes in topology, cooperative and collaborative algorithm and no centralized monitoring system. These features make the network more prone to malicious attack. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we present a new cluster based intrusion detection algorithm that takes care of black hole attacks in a MANET. This proposed algorithm is based on trustworthiness of the nodes in a network. The network is considered to be a layered structured. The nodes are member of a cluster. Each cluster has cluster head that takes care of all the members of its own cluster and communicates with cluster head at layer 2 whenever required. The cluster head at layer 2 communicate with all cluster head at layer 1. The selection of cluster head depends on three parameters battery power, mobility and trust value of a node in a cluster. Periodically the cluster head updation is done according to three parameters. We have implemented our algorithm using the NS simulator. The performance of the proposed Intrusion Detection System (IDS) has also been evaluated in the process. The performance graph shows marked improvement as far as packet dropping is concerned.


arXiv: Networking and Internet Architecture | 2010

A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS

Debdutta Barman Roy; Rituparna Chaki; Nabendu Chaki


International Journal of Wireless & Mobile Networks | 2011

MADSN: Mobile Agent Based Detection of Selfish Node in MANET

Debdutta Barman Roy; Rituparna Chaki


Archive | 2014

Different Types of Attacks for WANs

Debdutta Barman Roy; Rituparna Chaki


Archive | 2014

Routing for Ad-­Hoc Networks

Debdutta Barman Roy; Rituparna Chaki

Collaboration


Dive into the Debdutta Barman Roy's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manasi Sarkar

Calcutta Institute of Engineering and Management

View shared research outputs
Top Co-Authors

Avatar

Novarun Deb

University of Calcutta

View shared research outputs
Researchain Logo
Decentralizing Knowledge