Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks

被引:0
|
作者
Cretu, Gabriela F. [1 ]
Parekh, Janak J. [1 ]
Wang, Ke [1 ]
Stolfo, Salvatore J. [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
mobile ad-hoc networks; intrusion detection; anomaly detection; model exchange; profiling; model aggregation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad-hoc NETworks (MANETs) pose unique security requirements and challenges due to their reliance on open, peer-to-peer models that often don't require authentication between nodes. Additionally, the limited processing power and battery life of the devices used in a MANET also prevent the adoption of heavy-duty cryptographic techniques. While traditional misuse-based Intrusion Detection Systems (IDSes) may work in a MANET, watching for packet dropouts or unknown outsiders is difficult as both occur frequently in both malicious and non-malicious traffic. Anomaly detection approaches hold out more promise, as they utilize learning techniques to adapt to the wireless environment and flag malicious data. The anomaly detection model can also create device behavior profiles, which peers can utilize to help determine its trustworthiness. However, computing the anomaly model itself is a time-consuming and processor-heavy task. To avoid this, we propose the use of model exchange as a device moves between different networks as a means to minimize computation and traffic utilization. Any node should be able to obtain peers' model(s) and evaluate it against its own model of "normal" behavior. We present this model, discuss scenarios in which it may be used, and provide preliminary results and a framework for future implementation.
引用
收藏
页码:635 / 639
页数:5
相关论文
共 50 条
  • [41] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    ELECTRONICS, 2021, 10 (04)
  • [42] Evaluating failure detection in mobile ad-hoc networks
    Friedman, Roy
    Tcharny, Galya
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2009, 5 (04) : 476 - +
  • [43] Performance Evaluation of Intrusion Detection Approach for Mobile Ad-hoc Network
    Soni, Sonal
    Parihar, Arjun
    Panse, Trishna
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [44] A game-theoretic intrusion detection model for mobile ad hoc networks
    Otrok, Hadi
    Mohammed, Noman
    Wang, Lingyu
    Debbabi, Mourad
    Bhattacharya, Prabir
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 708 - 721
  • [45] On the anomaly intrusion-detection in mobile ad hoc network environments
    Puttini, Ricardo
    Hanashiro, Maira
    Miziara, Fabio
    de Sousa, Rafael
    Garcia-Villalba, L. Javier
    Barenco, C. J.
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 182 - 193
  • [46] A novel intrusion detection method for mobile ad hoc networks
    Yi, P
    Zhong, YP
    Zhang, SY
    ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 1183 - 1192
  • [47] A novel approach for intrusion detection in mobile ad hoc networks
    Chaudhari B.S.
    Prasad R.S.
    Int. J. Networking Virtual Organ., 2019, 3 (363-378): : 363 - 378
  • [48] A distributed intrusion detection scheme for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [49] Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
    Vaseer, Gurveen
    Ghai, Garima
    Ghai, Dhruva
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) : 35 - 39
  • [50] Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
    Sen, Sevil
    Clark, John A.
    PRICAI 2008: TRENDS IN ARTIFICIAL INTELLIGENCE, 2008, 5351 : 1053 - 1058