A modular architecture for distributed IDS in MANET

作者: Ricardo S Puttini , Jean-Marc Percher , Ludovic Mé , Olivier Camp , Rafael De Sousa

DOI: 10.1007/3-540-44842-X_11

关键词:

摘要: In this paper we propose a distributed and modular architecture for an intrusion detection system (IDS) dedicated to mobile ad hoc network (MANET) environment. The main feature of our proposition relies on the use, each node MANET, local IDS (LIDS) cooperating with other LIDSes through use agents. design is needed as response extensibility requirements related complex contexts MANET. proposed solution has been validated by proof-of-concept prototype, which described in paper. Two different types attacks are presented have implemented, at level application level. such formally specification data collection, attack signatures associated alerts generation, emphasizing relation these steps modules designed architecture. management information base (MIB) primary source process discussed MIB extraction processing specified implemented prototype. Experiments exhibit fairly good results, being collaboratively detected real-time.

参考文章(18)
Douglas E. Comer, David L. Stevens, Marshall T. Rose, Internetworking with TCP/IP, Vol. 3: Client-Server Programming and Applications, Linux/Posix Sockets Version Prentice Hall PTR. ,(2000)
Andreas Wespi, Marc Dacier, Hervé Debar, A revised taxonomy for intrusion-detection systems Annales Des Télécommunications. ,vol. 55, pp. 361- 378 ,(2000) , 10.1007/BF02994844
J. Macker, S. Corson, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations Request For Comments. ,vol. 2501, pp. 1- 12 ,(1999)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
G.B. White, E.A. Fisch, U.W. Pooch, Cooperating security managers: a peer-based intrusion detection system IEEE Network. ,vol. 10, pp. 20- 23 ,(1996) , 10.1109/65.484228
Douglas E. Comer, Internetworking with TCP/IP ,(1988)
Yongguang Zhang, Wenke Lee, Intrusion detection in wireless ad-hoc networks acm/ieee international conference on mobile computing and networking. pp. 275- 283 ,(2000) , 10.1145/345910.345958
J. Kiniry, D. Zimmerman, A hands-on look at Java mobile agents IEEE Internet Computing. ,vol. 1, pp. 21- 30 ,(1997) , 10.1109/4236.612210
Ying Chun, Lv Qin, Liu Yong, Shi MeiLin, Routing protocols overview and design issues for self-organized network international conference on communication technology. ,vol. 2, pp. 1298- 1303 ,(2000) , 10.1109/ICCT.2000.890905