๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

LIDF: Layered intrusion detection framework for ad-hoc networks

โœ Scribed by Nikos Komninos; Christos Douligeris


Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
210 KB
Volume
7
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.

โœฆ Synopsis


As ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks are no longer sufficient and effective when adapted directly to a wireless ad-hoc network. In this article, first the security challenges in intrusion detection for ad-hoc networks are identified and the related work for anomaly detection is discussed. We then propose a layered intrusion detection framework, which consists of collection, detection and alert modules that are handled by local agents. The collection, detection and alert modules are uniquely enabled with the main operations of ad-hoc networking, which are found at the OSI link and network layers. The proposed modules are based on interpolating polynomials and linear threshold schemes. An experimental evaluation of these modules shows their efficiency for several attack scenarios, such as route logic compromise, traffic patterns distortion and denial of service attacks.


๐Ÿ“œ SIMILAR VOLUMES


Collaborative techniques for intrusion d
โœ Ningrinla Marchang; Raja Datta ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 258 KB

In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea

Friend-assisted intrusion detection and
โœ S.A. Razak; S.M. Furnell; N.L. Clarke; P.J. Brooke ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 399 KB

Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in

A distributed intrusion detection system
โœ Adrian P. Lauf; Richard A. Peters; William H. Robinson ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 848 KB

This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds

Ad Hoc Wireless Networks (A Communicatio
โœ Tonguz, Ozan K.; Ferrari, Gianluigi ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› John Wiley & Sons, Ltd ๐ŸŒ English โš– 410 KB ๐Ÿ‘ 2 views

One of the new paradigms in wireless communications that is going to prevail in the next few decades is ad hoc networking.ย  *Ad Hoc Wireless Networks* seeks to explore this paradigm shift in wireless networking and presents topics ranging from the basic principles of networking and communication sys