This action might not be possible to undo. Are you sure you want to continue?
; Kyong-Heon Han; Dong-You Choi; Seung-Jo Han; Dept. of Inf. & Commun. Eng., Chosun Univ., Gwangju, South Korea
This paper appears in: Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on Issue Date : 20-23 April 2010 On page(s): 647 - 654 ISSN : 1550-445X Print ISBN: 978-1-4244-6695-5 References Cited: 21 INSPEC Accession Number: 11358937 Digital Object Identifier : 10.1109/AINA.2010.52 Date of Current Version : 01 June 2010 Abstract
Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper, we have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes and different types of DoS attacks by exploiting the information available
while monitoring each visiting node for malicious behaviour. The proposed IDS incorporates a novel random walk-based IDS architecture as well as a multi-layer. low overhead. Panepistimioupolis. and robustness to changes in topology. Christoforos. specification-based engine monitors the transport. the multi-layer. Ioannis. Athens. Department of Informatics & Telecommunications. Greece This paper appears in: Security and Cryptography (SECRYPT). self-contained Random Walk Detectors (RWDs).10 Date of Current Version : 05 April 2011 Abstract This paper proposes a novel Intrusion Detection System (IDS) for Mobile Ad Hoc Networks (MANETs) that aims at overcoming the limitations and weaknesses of the existing IDSs. University of Athens. We have implemented fixed width clustering algorithm for efficient detection of the anomalies in the MANET traffic and also generated different types of attacks in the network. The proposed solution does not belong to any of the existing intrusion detection approaches. Stavrakakis. Ilisia. Xenakis. Christos. simplicity. The simulation of the proposed architecture is performed in OPNET simulator and we got the result as we expected. specification-based detection engine. RWDs exhibit a number of benefits including locality. which may freely move from node to node and randomly traverse a network. Moreover. We have used cooperative anomaly intrusion detection with data mining technique to enhance the proposed architecture. A novel Intrusion Detection System for MANETs Panos. since it relies on a set of robust.across different layers of protocol stack in order to improve the accuracy of detection. PC 15784. network and data . Proceedings of the 2010 International Conference on Issue Date : 26-28 July 2010 On page(s): 1 .
Bhattacharya. P. for Inf. Moreover. J. Simulators are the most common tools used for testing the IDS. Concordia Inst.. Testing Intrusion Detection Systems in MANET: A Comprehensive Study Otrok. we add some new features and their associated measurements that we believe important for testing new proposed IDS.1109/CNSR. Syst.62 Date of Current Version : 29 May 2007 Abstract In this paper. Paquet. Finally.link layers of the protocol stack. Montreal.371 Print ISBN: 0-7695-2835-X References Cited: 17 INSPEC Accession Number: 10288883 Digital Object Identifier : 10. there has not been any work done for testing IDS in MANET.2007. . Therefore. we present some input parameter precautions that help on having more trustworthy testing results. Testing is achieved by simulating different measurements. The modified measurements with the new added ones form a set of measurements that will be used throughout the testing process. Debbabi. M.. QC This paper appears in: Communication Networks and Services Research. we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET).. To the best of our knowledge. Security Lab. CNSR '07. Fifth Annual Conference on Issue Date : 14-17 May 2007 On page(s): 364 . providing an integrated solution capable of detecting the majority of security attacks occurring in MANETs.. H. we add some precautions for choosing a simulator and a list of available simulators... Comput. We modify the testing measurements of infrastructure-based networks to be compatible with the characteristics of MANET.. Eng. 2007. The precautions will help researchers to test the measurements efficiently and the list of simulators will guide them to select one according to their needs.
1109/SECPERU.Detecting critical nodes for MANET intrusion detection systems Karygiannis. SecPerU 2006.8 Date of Current Version : 10 July 2006 Abstract Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion. proactive. Privacy and Trust in Pervasive and Ubiquitous Computing. This paper presents a method for . detect. The common design goal of reactive. Apostolopoulos. MD This paper appears in: Security. Second International Workshop on Issue Date : 29-29 June 2006 On page(s): 9 pp. and diagnose malicious activity. but an ad hoc network does not have these types of network elements where the intrusion detection system (IDS) can collect and analyze audit data for the entire network.2006. A. of Stand.. 2006.. routers and gateways. The resources consumed by ad hoc network member nodes to monitor. & Technol. National Inst. and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained environment. report. may be greater than simply rerouting packets through a different available path.15 Print ISBN: 0-7695-2549-0 References Cited: 16 INSPEC Accession Number: 9063230 Digital Object Identifier : 10. faulty nodes.. E.. trust-building. however. A. Gaithersburg. Antonakakis. and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad hoc networks. A number of neighbor-monitoring. . Traffic monitoring in wired networks is usually performed at switches. Detecting malicious nodes in an open ad hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. and dynamically changing topologies.
describes the details of a critical node test implementation. Taiwan Univ. of Comput. Nat. Taipei This paper appears in: Vehicular Technology Conference..746 ISSN : 1550-2252 Print ISBN: 0-7803-9391-0 References Cited: 20 INSPEC Accession Number: 9111589 Digital Object Identifier : 10. In order to set up a secured MANET. & Technol.determining conditions under which critical nodes should be monitored. and offers a new approach for conserving the limited resources of an ad hoc network IDS Design of a Joint Defense System for Mobile Ad Hoc Networks Huei-Wen Ferng. Sci.2006. VTC 2006-Spring. 2006. & Inf.. IEEE 63rd Issue Date : 7-10 May 2006 Volume : 2 On page(s): 742 . Eng. of Sci. presents experimental results. .1682923 Date of Current Version : 18 September 2006 Abstract A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment.1109/VETECS. Chien-Liang Liu. Dept.
such an intrusion detection system is able to amend drawbacks of single-technique systems and enhance usage/right of normal users as well as security of MANETs . we propose an intrusion detection system that integrates a finite state machine (FSM) and a support vector machine (SVM) to analyze traffic patterns of MANETs.we should not only adopt encryption and authentication. Focusing on intrusion detection. but also equip each node with an intrusion detection system to detect malicious attackers. Shown by numerical examples.