Detecting critical nodes for MANET intrusion detection systems

作者: A. Karygiannis , E. Antonakakis , A. Apostolopoulos

DOI: 10.1109/SECPERU.2006.8

关键词:

摘要: Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, hybrid ad is faithfully route packets from a source node destination while maintaining satisfactory level service in resource-constrained environment. Detecting malicious nodes an open which participating no previous security associations presents number challenges not faced by traditional wired networks. Traffic monitoring networks usually performed at switches, routers gateways, but does these types elements where the intrusion detection system (IDS) can collect analyze audit data for entire network. A neighbor-monitoring, trust-building, cluster-based voting schemes proposed research enable reporting activity resources consumed member monitor, detect, report, diagnose activity, however, may be greater than simply rerouting through different available path. This paper method determining conditions under critical should monitored, describes details test implementation, experimental results, offers new approach conserving limited IDS.

参考文章(18)
Ricardo S Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael De Sousa, Cláudia J Barenco Abbas, L Javier García-Villalba, None, A modular architecture for distributed IDS in MANET international conference on computational science and its applications. pp. 91- 113 ,(2003) , 10.1007/3-540-44842-X_11
Bernard Jouga, Ricardo Staciarini Puttini, Patrick Albers, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. Wireless Information Systems. pp. 1- 12 ,(2002)
Robert Andresen, Monitoring Linux with Native Tools. Int. CMG Conference. pp. 345- 354 ,(2004)
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
Asad Amir Pirzada, Chris McDonald, Establishing trust in pure ad-hoc networks ad hoc networks. pp. 47- 54 ,(2004)
A. A. Pirzada, C. Mcdonald, Trust Establishment In Pure Ad-hoc Networks Wireless Personal Communications. ,vol. 37, pp. 139- 168 ,(2006) , 10.1007/S11277-006-1574-5
Yongguang Zhang, Wenke Lee, Intrusion detection in wireless ad-hoc networks acm/ieee international conference on mobile computing and networking. pp. 275- 283 ,(2000) , 10.1145/345910.345958
Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl Levitt, A specification-based intrusion detection system for AODV Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03. pp. 125- 134 ,(2003) , 10.1145/986858.986876
Bo Sun, Kui Wu, Udo W. Pooch, Alert aggregation in mobile ad hoc networks workshop on wireless security. pp. 69- 78 ,(2003) , 10.1145/941311.941323
J. Parker, J. Undercoffer, J. Pinkston, A. Joshi, On intrusion detection and response for mobile ad hoc networks IEEE International Conference on Performance, Computing, and Communications, 2004. pp. 747- 752 ,(2004) , 10.1109/PCCC.2004.1395172