Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks

被引:0
|
作者
Cretu, Gabriela F. [1 ]
Parekh, Janak J. [1 ]
Wang, Ke [1 ]
Stolfo, Salvatore J. [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
mobile ad-hoc networks; intrusion detection; anomaly detection; model exchange; profiling; model aggregation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad-hoc NETworks (MANETs) pose unique security requirements and challenges due to their reliance on open, peer-to-peer models that often don't require authentication between nodes. Additionally, the limited processing power and battery life of the devices used in a MANET also prevent the adoption of heavy-duty cryptographic techniques. While traditional misuse-based Intrusion Detection Systems (IDSes) may work in a MANET, watching for packet dropouts or unknown outsiders is difficult as both occur frequently in both malicious and non-malicious traffic. Anomaly detection approaches hold out more promise, as they utilize learning techniques to adapt to the wireless environment and flag malicious data. The anomaly detection model can also create device behavior profiles, which peers can utilize to help determine its trustworthiness. However, computing the anomaly model itself is a time-consuming and processor-heavy task. To avoid this, we propose the use of model exchange as a device moves between different networks as a means to minimize computation and traffic utilization. Any node should be able to obtain peers' model(s) and evaluate it against its own model of "normal" behavior. We present this model, discuss scenarios in which it may be used, and provide preliminary results and a framework for future implementation.
引用
收藏
页码:635 / 639
页数:5
相关论文
共 50 条
  • [31] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [32] Connectivity Model for Mobile Ad-Hoc Networks
    Bruun, Rasmus Liborius
    Voulgaris, Konstantinos
    Pedersen, Troels
    2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2022,
  • [33] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [34] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [35] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [36] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping
    Jiang Xinghao
    Wu Yue
    Liu Ning
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 851 - 859
  • [37] LIDF: Layered intrusion detection framework for ad-hoc networks
    Komninos, Nikos
    Douligeris, Christos
    AD HOC NETWORKS, 2009, 7 (01) : 171 - 182
  • [38] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [39] A partition detection system for mobile ad-hoc networks
    Ritter, H
    Winter, R
    Schiller, J
    2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 489 - 497
  • [40] Routing anomaly detection in mobile ad hoc networks
    Sun, B
    Wu, K
    Pooch, UW
    ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 25 - 31