Application-Layer Intrusion Detection in MANETs

被引:0
|
作者
Chang, Katharine [1 ]
Shin, Kang G. [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many mission- and life-critical applications. However, the broadcast nature of inter-node communications and node mobility in MANETs make it very challenging to secure MANETs. Moreover, their constantly-changing topology causes network node density and neighbor relationships to change dynamically. This paper presents an intrusion detection system (IDS) for MANETs at the application layer. The IDS utilizes (1) both anomaly and misuse detection schemes to identify attacks in MANETs and (2) mobile agents (MAs) to augment each node's intrusion-detection capability. In particular, each node is equipped with a local IDS, and MAs will be dispatched periodically or on-demand to augment each node's IDS. We present the design of this IDS and the overall network structure, as well as the methods for authenticating and dispatching MAs. We also evaluate the trade-offs between different design parameters of MAs.
引用
收藏
页码:2800 / 2809
页数:10
相关论文
共 50 条
  • [1] Application-layer multicast in MANETs: To broadcast or not to broadcast?
    Baumung, Peter
    2008 FIFTH ANNUAL CONFERENCE ON WIRELESS ON DEMAND NETWORK SYSTEMS AND SERVICES, 2008, : 133 - 140
  • [2] Dynamic application-layer protocol analysis for network intrusion detection
    Dreger, Holger
    Feldmann, Anja
    Mai, Michael
    Paxson, Vern
    Sommer, Robin
    USENIX Association Proceedings of the 15th USENIX Security Symposium, 2006, : 257 - 272
  • [3] Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords
    Xie, Bailin
    Zhang, Qiansheng
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2131 - 2135
  • [4] An approach to application-layer DoS detection
    Kemp, Cliff
    Calvert, Chad
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    JOURNAL OF BIG DATA, 2023, 10 (01)
  • [5] An approach to application-layer DoS detection
    Cliff Kemp
    Chad Calvert
    Taghi M. Khoshgoftaar
    Joffrey L. Leevy
    Journal of Big Data, 10
  • [6] Cross layer versus single layer approaches for intrusion detection in MANETs
    Joseph, John Felix Charles
    Das, Amitabha
    Seet, Boon-Chong
    Lee, Bu-Sung
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 318 - 323
  • [7] Detection of Application-Layer DDoS by Clustering Algorithm
    She, Chuyu
    Wen, Wushao
    Lin, Zaihua
    Zheng, Kesong
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 102 - 104
  • [8] Detecting Application-layer Attacks Based on User's Application-layer Behaviors
    Xie, Bailin
    Jiang, Shengyi
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 607 - 612
  • [9] Application-layer multicast
    Katrinis, K
    May, M
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 157 - 170
  • [10] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737