Amit Kumar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 632-637 © 2014, IJCSMC All Rights Reserved 632 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IJCSMC, Vol. 3, Issue. 3, March 2014, pg.632 637 RESEARCH ARTICLE A Statistical Communication Analysis Model for Attack Detection in Mobile Network Amit Kumar Omprakash Tailor Mr. Krishna Kumar Student, M.Tech Student, M.Tech Assistant Professor Deptt. Of Computer Sc. & App. Deptt. Of Computer Sc. & App. Deptt. Of Computer Sc. & App. Pratap University, Jaipur Pratap University, Jaipur Pratap University, Jaipur AbstractSecurity is one of the most critical issue of mobile network that ensures the reliable communication over the network. Because of dynamic property of Mobile Adhoc Network, the chances of the security issues increases. These attacks are incorporated at different security layers of the network. To handle these attacks, different researchers have defined many authentication based, prevention based and detection based approaches. In this paper, a description of one of such standard security model is presented based on the statistical analysis. The presented analysis model will perform the communication analysis under different attacks and analyze the severity of attack. The work is presented as the constraint based model description so that the reliable communication will be ensured. Keywords: Constraint Based, Statistical, Detection Machanism, Preventive Approach I. INTRODUCTION A mobile network is a dynamic communication adhoc network, in which any node can enter or exist to the network at any instance of time. Because of this, the external intruder node can easily participate in the network. The attacker node can also specify its identity that cannot be identify as a trustful node at the first time data access. Because of this, the criticality of the network is very high. All the layers of the communication network having the chances of attack infection. Each layer of communication network having different impact on the network, based on this impact and consequence analysis, different security mechanism are suggested[1][2]. These security mechanisms are divided in three main categories shown in figure 1. The authentication approaches are basically used to identify the trustful nodes over the network. A node that proven its identity is considered as the trustful node. To perform this analysis, the safety rule is applied while performing the signature check of the communicating node. The authentication stage of the node is now improved with the involvement of different cryptographic approaches. These