On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol

被引:1
|
作者
Alattar, Mouhannad [1 ]
Sailhan, Francoise [2 ]
Bourgeois, Julien [1 ]
机构
[1] UFC FEMTO ST Inst, UMR CNRS 6174, F-25201 Montbeliard, France
[2] CNAM, Cedr Lab, F-75003 Paris, France
关键词
MOBILE AD-HOC; ENERGY-CONSUMPTION; ANOMALY DETECTION; FRAMEWORK; NETWORKS; NODES;
D O I
10.1155/2013/521497
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e. g., memory and bandwidth) and high detection rate along with reduced false positives.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An effective intrusion detection approach for OLSR MANET protocol
    Wang, M
    Lamont, L
    Mason, P
    Gorlatova, M
    [J]. 2005 First Workshop on Secure Network Protocols (NPSEC), 2005, : 55 - 60
  • [2] Detecting Attacks in QoS-OLSR Protocol
    Sanadiki, Hiba
    Otrok, Hadi
    Mourad, Azzam
    Robert, Jean-Marc
    [J]. 2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1126 - 1131
  • [3] A Lightweight Intrusion Detection System for CAN Protocol Using Neighborhood Similarity
    Refat, Rafi Ud Daula
    Abu Elkhail, Abdulrahman
    Malik, Hafiz
    [J]. 2022 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MACHINE LEARNING APPLICATIONS (CDMA 2022), 2022, : 121 - 126
  • [4] A specification-based intrusion detection model for OLSR
    Tseng, CH
    Song, T
    Balasubramanyam, P
    Ko, C
    Levitt, K
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 330 - 350
  • [5] Intrusion Detection System for Power-Aware OLSR
    Dutta, Chaitali Biswas
    Biswas, Utpal
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2015, : 142 - 147
  • [6] Modeling Collaborative Robots for Detecting Intrusions
    Liang, Xiannuan
    Xiao, Yang
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 306 - 313
  • [7] Lightweight agents for intrusion detection
    Helmer, G
    Wong, JSK
    Honavar, V
    Miller, L
    Wang, YX
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) : 109 - 122
  • [8] A survey of VoIP intrusions and intrusion detection systems
    Vuong, S
    Bai, Y
    [J]. 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 317 - 322
  • [9] On Lightweight Method for Intrusions Detection in the Internet of Things
    Shakhov, Vladimir
    Jan, Sana Ullah
    Ahmed, Saeed
    Koo, Insoo
    [J]. 2019 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2019,
  • [10] Stochastic protocol modeling for anomaly based network intrusion detection
    Estevez-Tapiador, JM
    Garcia-Teodoro, P
    Diaz-Verdejo, JE
    [J]. IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 3 - 12