Results 1 - 10
of
16
Investigating Intrusion Detection Systems in MANET and Comparing Idss for Detecting Misbehaving Nodes
- in Proceedings of World Academy of Science, Engineering and Technology
, 2008
"... Abstract—As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central ma ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
(Show Context)
Abstract—As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Therefore intrusion detection is one of the possible ways in recognizing a possible attack before the system could be penetrated. All in all, techniques for intrusion detection in old wireless networks are not suitable for MANET. In this paper, we classify the architecture for Intrusion detection systems that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANET presented and compared. We then indicate important future research directions.
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
- Computer Networks
, 2011
"... Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their dynamic nature, the lack of central points, and their highly resource-constrained nodes. In this paper we explore the use of evolutionary computation techniques, partic-ularly genetic programming and gramma ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
(Show Context)
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their dynamic nature, the lack of central points, and their highly resource-constrained nodes. In this paper we explore the use of evolutionary computation techniques, partic-ularly genetic programming and grammatical evolution, to evolve intrusion detection programs for such challenging environments. Cognizant of the particular importance of power efficiency we analyze the power consumption of evolved programs and employ a multi-objective evolutionary algorithm to discover optimal trade-offs between intrusion detection ability and power consumption.
A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network
"... Mobile Ad Hoc Networks are more vulnerable to attacks. Due to vulnerability, security in MANETs has been an issue of prime importance in the recent years. The common attack prevention techniques such as cryptographic techniques (Authentication/Digital Signatures) cannot be implemented in MANETs as t ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Mobile Ad Hoc Networks are more vulnerable to attacks. Due to vulnerability, security in MANETs has been an issue of prime importance in the recent years. The common attack prevention techniques such as cryptographic techniques (Authentication/Digital Signatures) cannot be implemented in MANETs as there is no central controlling device for authentication. This necessitates the need for some other security mechanisms to prevent/detect various types of attacks in MANETs. One such mechanism is to implement Intrusion Detection System. Intrusion Detection System (IDS) has been widely studied in the past and continues to be focus of research in the recent years. This paper summarizes the most prominent IDS Architectures for MANETs published in the last five years. The summary includes brief descriptions of IDS architecture, IDS Techniques (Detection Engines), Types of Attacks detected and Data gathering techniques, followed by the author’s comments on strength, weaknesses and limitations of each technique. Further, a comprehensive table is presented including all summarized papers, at a glance, lists salient features and author’s comments for each technique to facilitate new researchers to select a specific area for their work.
Dear Author,
"... You can submit your corrections online, via e-mail or by fax. For online submission please insert your corrections in the online correction form. Always indicate the line number to which the correction refers. You can also insert your corrections in the proof PDF and email the annotated PDF. For fax ..."
Abstract
- Add to MetaCart
(Show Context)
You can submit your corrections online, via e-mail or by fax. For online submission please insert your corrections in the online correction form. Always indicate the line number to which the correction refers. You can also insert your corrections in the proof PDF and email the annotated PDF. For fax submission, please ensure that your corrections are clearly legible. Use a fine black pen and write the correction in the margin, not too close to the edge of the page. Remember to note the journal title, article number, and your name when sending your response via e-mail or fax. Check the metadata sheet to make sure that the header information, especially author names and the corresponding affiliations are correctly shown. Check the questions that may have arisen during copy editing and insert your answers/ corrections. Check that the text is complete and that all figures, tables and their legends are included. Also check the accuracy of special characters, equations, and electronic supplementary material if applicable. If necessary refer to the Edited manuscript. The publication of inaccurate data such as dosages and units can have serious consequences. Please take particular care that all such details are correct. Please do not make changes that involve only matters of style. We have generally introduced forms that follow the journal’s style. Substantial changes in content, e.g., new results, corrected values, title and authorship are not allowed without the approval of the responsible editor. In such a case, please contact the Editorial Office and return his/her consent together with the proof. If we do not receive your corrections within 48 hours, we will send you a reminder. Your article will be published Online First approximately one week after receipt of your corrected proofs. This is the official first publication citable with the DOI. Further changes are, therefore, not possible. The printed version will follow in a forthcoming issue. Please note After online publication, subscribers (personal/institutional) to this journal will have access to the complete article via the DOI using the
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems
, 2010
"... Abstract Under highly security vulnerable, resource-restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while bounding the communication response time for mission-oriented mobile groups. In this paper, we analyze the tradeoff of ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract Under highly security vulnerable, resource-restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while bounding the communication response time for mission-oriented mobile groups. In this paper, we analyze the tradeoff of security versus performance for distributed intrusion detection protocols employed in mobile group communication systems (GCSs). We investigate a distributed voting-based intrusion detection protocol for GCSs in multi-hop mobile ad hoc networks and examine the effect of intrusion detection on system survivability measured by the mean time to security failure (MTTSF) metric and efficiency measured by the communication cost metric. We identify optimal design settings under which the MTTSF metric can be best traded off for the communication cost metric or vice versa. We conduct extensive simulation to validate analytical results obtained. This work provides a general model-based evaluation framework for developing and analyzing intrusion detection protocols that can dynamically adapt to changing attacker strengths with the goal of system lifetime optimization and/or communication cost minimization.
Chapter 1 Intrusion Detection in Wireless Mesh Networks
"... Wireless mesh networks are potentially vulnerable to a broad variety of attacks. Hence security is an important consideration for the practical operation of wireless mesh networks. Within security, intrusion detection is the first line of defense in wireless networks as well as wired networks. Unfor ..."
Abstract
- Add to MetaCart
(Show Context)
Wireless mesh networks are potentially vulnerable to a broad variety of attacks. Hence security is an important consideration for the practical operation of wireless mesh networks. Within security, intrusion detection is the first line of defense in wireless networks as well as wired networks. Unfortunately, wireless mesh networks presents additional challenges due to their decentralized nature, dynamic network topology, and easy access to the radio medium. Due to these unique challenges, intrusion detection techniques can not be borrowed straightforwardly from wired networks. New distributed intrusion detection schemes must be
Contents lists available at ScienceDirect Computer Networks
"... journal homepage: www.elsevier.com/locate/comnet Evolutionary computation techniques for intrusion detection in mobile ad hoc networks ..."
Abstract
- Add to MetaCart
(Show Context)
journal homepage: www.elsevier.com/locate/comnet Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
An Approach for Determining Conditions for Monitoring of Critical Nodes for MANET Intrusion Detection System
"... In modern generation, the applications of MANET are increasing in use. But MANET are more vulnerable to many attacks because of their adhoc nature. The security issue is the main concern in the use of MANET application.Therefor, the selection of efficient methodologies and techniques to protect MANE ..."
Abstract
- Add to MetaCart
(Show Context)
In modern generation, the applications of MANET are increasing in use. But MANET are more vulnerable to many attacks because of their adhoc nature. The security issue is the main concern in the use of MANET application.Therefor, the selection of efficient methodologies and techniques to protect MANET is an important aspect. Detecting malicious nodes in an open adhoc network in which participating nodes have no previous security associations presents a number of challenges not faced by the traditional wired networks. Traffic monitoring in wired network is usually preferred at switches, routers and gateways, but adhoc network does not have these types of network elements where the Intrusion Detection System (IDS) can collect and analyze audit data for the entire network. This paper presents an approach for determining conditions under which critical nodes should be monitored. Here, we focus on the trigger mechanism for the invocation of critical node test for MANET Intrusion Detection system.
Identification of Critical Node for the Efficient Performance in Manet
"... Abstract — This paper considers a network where nodes are connected randomly and can fail at random times. The critical-node test detects nodes, whose failures are malicious behavior, disconnects or significantly degrades the performance of the network. The critical node is an element, position or c ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — This paper considers a network where nodes are connected randomly and can fail at random times. The critical-node test detects nodes, whose failures are malicious behavior, disconnects or significantly degrades the performance of the network. The critical node is an element, position or control entity whose disruption, is immediately degrades the ability of a force to command, control or effectively conducts combat operations. If a node is critical node, then more attention must be paid to it to avoid its failure or removal of a network. So how to confirm critical nodes in the ad hoc network is the premise to predict the network partition. A critical node is the most important node within the entity of a network. This paper suggests methods that find the critical nodes of a network based on residual battery power, reliability, bandwidth, availability and service traffic type. The metrics for evaluation has been considered as packet delivery ratio, end-to-end delay and throughput. Keywords- Critical node; malicious; residual battery power; reliability; bandwidth; Mobile Ad hoc Network. I.
Considerations for Wireless Network Situational Awareness
, 2006
"... The scientific or technical validity of this contract is entirely the responsibility of the contractor and the contents ..."
Abstract
- Add to MetaCart
(Show Context)
The scientific or technical validity of this contract is entirely the responsibility of the contractor and the contents