An agent based intrusion detection model for mobile ad hoc networks

被引:3
|
作者
Reshmi, B. M. [1 ]
Manvi, S. S. [2 ]
Bhagyavati [3 ]
机构
[1] Basaveshwara Engn Coll, Dept Informat Sci & Engn, Bagalkot, India
[2] Basaveshwara Engn Coll, Dept Elect & Commun Engn, Bagalkot 587102, India
[3] Columbus State Univ, Dept Comp Sci, Univ Syst Georgia, Columbus, GA 31907 USA
关键词
D O I
10.1155/2006/921047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.
引用
收藏
页码:169 / 191
页数:23
相关论文
共 50 条
  • [1] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [2] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [3] An Intrusion Detection System Model for Ad Hoc Networks Based on the Adjacent Agent
    Zhou, Hua
    Li, Junlin
    Zhao, Na
    Dai, Fei
    Jiang, Rong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 598 - +
  • [4] Agent-based immunological intrusion detection system for Mobile Ad-hoc Networks
    Byrski, Aleksander
    Carvalho, Marco
    COMPUTATIONAL SCIENCE - ICCS 2008, PT 3, 2008, 5103 : 584 - +
  • [5] Mobile agent based cross-layer intrusion detection system for Ad Hoc networks
    School of Information Science and Technology, Northeastern University, Shenyang 110004, China
    不详
    Gaojishu Tongxin, 2007, 11 (1107-1111):
  • [6] Human immune-based model for intrusion detection in mobile ad hoc networks
    Maha Abdelhaq
    Raed Alsaqour
    Abeer Algarni
    Maali Alabdulhafith
    Mahmoud Alawi
    Aqeel Taha
    Baraa Sharef
    Mustafa Tariq
    Peer-to-Peer Networking and Applications, 2020, 13 : 1046 - 1068
  • [7] Human immune-based model for intrusion detection in mobile ad hoc networks
    Abdelhaq, Maha
    Alsaqour, Raed
    Algarni, Abeer
    Alabdulhafith, Maali
    Alawi, Mahmoud
    Taha, Aqeel
    Sharef, Baraa
    Tariq, Mustafa
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (03) : 1046 - 1068
  • [8] Host based intrusion detection architecture for mobile ad hoc networks
    Ray, Prabhudutta
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1942 - 1946
  • [9] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [10] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859