Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks

被引:0
|
作者
Cretu, Gabriela F. [1 ]
Parekh, Janak J. [1 ]
Wang, Ke [1 ]
Stolfo, Salvatore J. [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
mobile ad-hoc networks; intrusion detection; anomaly detection; model exchange; profiling; model aggregation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad-hoc NETworks (MANETs) pose unique security requirements and challenges due to their reliance on open, peer-to-peer models that often don't require authentication between nodes. Additionally, the limited processing power and battery life of the devices used in a MANET also prevent the adoption of heavy-duty cryptographic techniques. While traditional misuse-based Intrusion Detection Systems (IDSes) may work in a MANET, watching for packet dropouts or unknown outsiders is difficult as both occur frequently in both malicious and non-malicious traffic. Anomaly detection approaches hold out more promise, as they utilize learning techniques to adapt to the wireless environment and flag malicious data. The anomaly detection model can also create device behavior profiles, which peers can utilize to help determine its trustworthiness. However, computing the anomaly model itself is a time-consuming and processor-heavy task. To avoid this, we propose the use of model exchange as a device moves between different networks as a means to minimize computation and traffic utilization. Any node should be able to obtain peers' model(s) and evaluate it against its own model of "normal" behavior. We present this model, discuss scenarios in which it may be used, and provide preliminary results and a framework for future implementation.
引用
收藏
页码:635 / 639
页数:5
相关论文
共 50 条
  • [21] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373
  • [22] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [23] An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 119
  • [24] Agent-based immunological intrusion detection system for Mobile Ad-hoc Networks
    Byrski, Aleksander
    Carvalho, Marco
    COMPUTATIONAL SCIENCE - ICCS 2008, PT 3, 2008, 5103 : 584 - +
  • [25] A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Peter X.
    Tang, Helen
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [26] An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques
    Ganapathy, S.
    Yogesh, P.
    Kannan, A.
    ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 117 - 122
  • [27] A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc Networks
    Ma, Chuan-xiang
    Fang, Ze-ming
    Wang, Lei-chun
    Li, Qing-hua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 366 - +
  • [28] An Energy Efficient Scheduling Scheme for Intrusion Detection System in Mobile Ad-hoc Networks
    Kisku, Bapi
    Datta, Raja
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 1 - 6
  • [29] A Review on Intrusion Detection System in Mobile Ad-Hoc Network
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 549 - 554
  • [30] Probabilistic Monitoring in Intrusion Detection Module for Energy Efficiency in Mobile Ad-hoc Networks
    De Rango, Floriano
    Lupia, Andrea
    UNMANNED SYSTEMS TECHNOLOGY XVIII, 2016, 9837