Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks

被引:0
|
作者
Cretu, Gabriela F. [1 ]
Parekh, Janak J. [1 ]
Wang, Ke [1 ]
Stolfo, Salvatore J. [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
mobile ad-hoc networks; intrusion detection; anomaly detection; model exchange; profiling; model aggregation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad-hoc NETworks (MANETs) pose unique security requirements and challenges due to their reliance on open, peer-to-peer models that often don't require authentication between nodes. Additionally, the limited processing power and battery life of the devices used in a MANET also prevent the adoption of heavy-duty cryptographic techniques. While traditional misuse-based Intrusion Detection Systems (IDSes) may work in a MANET, watching for packet dropouts or unknown outsiders is difficult as both occur frequently in both malicious and non-malicious traffic. Anomaly detection approaches hold out more promise, as they utilize learning techniques to adapt to the wireless environment and flag malicious data. The anomaly detection model can also create device behavior profiles, which peers can utilize to help determine its trustworthiness. However, computing the anomaly model itself is a time-consuming and processor-heavy task. To avoid this, we propose the use of model exchange as a device moves between different networks as a means to minimize computation and traffic utilization. Any node should be able to obtain peers' model(s) and evaluate it against its own model of "normal" behavior. We present this model, discuss scenarios in which it may be used, and provide preliminary results and a framework for future implementation.
引用
收藏
页码:635 / 639
页数:5
相关论文
共 50 条
  • [1] Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
    Cabrera, Joao B. D.
    Gutierrez, Carlos
    Mehra, Raman K.
    INFORMATION FUSION, 2008, 9 (01) : 96 - 119
  • [2] Anomaly based Intrusion detection of Packet Dropping Attacks in Mobile Ad-hoc Networks
    Uyyala, Shivani
    Naik, Dinesh
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1137 - 1140
  • [3] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [4] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [5] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [6] Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
    Vetrichelvi
    Rajaram
    Vanitha
    Mohankumar, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 215 - 219
  • [7] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [8] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [9] Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks
    Cabrera, Joao B. D.
    Gutierrez, Carlos
    Mehra, Raman K.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1831 - 1837
  • [10] An Exchange Framework for Intrusion Alarm Reduction in Mobile Ad-hoc Networks
    Wang, Shiau-Huey
    JOURNAL OF COMPUTERS, 2013, 8 (07) : 1648 - 1655