Application-Layer Intrusion Detection in MANETs

被引:0
|
作者
Chang, Katharine [1 ]
Shin, Kang G. [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many mission- and life-critical applications. However, the broadcast nature of inter-node communications and node mobility in MANETs make it very challenging to secure MANETs. Moreover, their constantly-changing topology causes network node density and neighbor relationships to change dynamically. This paper presents an intrusion detection system (IDS) for MANETs at the application layer. The IDS utilizes (1) both anomaly and misuse detection schemes to identify attacks in MANETs and (2) mobile agents (MAs) to augment each node's intrusion-detection capability. In particular, each node is equipped with a local IDS, and MAs will be dispatched periodically or on-demand to augment each node's IDS. We present the design of this IDS and the overall network structure, as well as the methods for authenticating and dispatching MAs. We also evaluate the trade-offs between different design parameters of MAs.
引用
收藏
页码:2800 / 2809
页数:10
相关论文
共 50 条
  • [31] Altruism driven application-layer multicast
    Wang, Miao
    Peng, Ge
    Zhang, Yujun
    Li, Guojie
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (05): : 729 - 735
  • [32] A lightweight application-layer signaling protocol
    Kitamura, Tsutomu
    Shizuno, Takayuki
    Okabe, Toshiya
    Tani, Hideaki
    2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 448 - 452
  • [33] Application-layer multicast with Delaunay triangulations
    Liebeherr, J
    Nahas, M
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 1651 - 1655
  • [34] Intrusion detection in MANETs - The second wall of defense
    Nadkarni, K
    Mishra, A
    IECON'03: THE 29TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1 - 3, PROCEEDINGS, 2003, : 1235 - 1238
  • [35] Tackling Application-layer DDoS Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 432 - 441
  • [36] Loss recovery in application-layer multicast
    Jin, Xing
    Yiu, W. -P. Ken
    Chan, S. -H. Gary
    IEEE MULTIMEDIA, 2008, 15 (01) : 18 - 27
  • [37] Application-layer mobility using SIP
    Schulzrinne, H
    Wedlund, E
    2000 IEEE SERVICE PORTABILITY AND VIRTUAL CUSTOMER ENVIRONMENTS, 2001, : 29 - 36
  • [38] A SURVEY OF APPLICATION-LAYER MULTICAST PROTOCOLS
    Hosseini, Mojtaba
    Ahmed, Dewan Tanvir
    Shirmohammadi, Shervin
    Georganas, Nicolas D.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (03): : 58 - 74
  • [39] Detection of application-layer DDoS attacks using machine learning and genetic algorithms
    Sharif, Dyari Mohammed
    Beitollahi, Hakem
    COMPUTERS & SECURITY, 2023, 135
  • [40] On the stability of application-layer multicast tree
    Xu, Ke
    Liu, Jiangchuan
    Fu, Lizheng
    Liu, Chunyu
    Computer and Information Sciences - ISCIS 2006, Proceedings, 2006, 4263 : 401 - 412