A scheme for intrusion detection and response in ad hoc networks

被引:1
|
作者
Azer, Marianne A. [1 ]
El-Kassas, Sherif M. [2 ]
El-Soudani, Magdy S. [3 ]
机构
[1] Inst Natl Telecommun, Dept Comp, Cairo, Egypt
[2] Amer Univ Cairo, Dept Comp Sci, Cairo, Egypt
[3] Cairo Univ, Fac Engn, Dept Elect Commun, Cairo, Egypt
关键词
ad hoc networks; intrusion detection; security; wormhole attack;
D O I
10.1007/978-1-4020-6270-4_42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing and detecting attacks in these networks. In this paper, we propose three schemes for intrusion detection in ad hoc networks and demonstrate their effectiveness by applying them to the wormhole attack. The first scheme is based on attack graphs, the second is based on the theory of the diffusion of innovations and the third is based on the aggregation lists of events. The advantages and disadvantages of each scheme are identified and a combined model for intrusion detection is presented. Furthermore, a response module is proposed to augment the intrusion detection functions
引用
收藏
页码:507 / +
页数:3
相关论文
共 50 条
  • [1] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [2] A distributed intrusion detection scheme for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [3] A key management scheme combined with intrusion detection for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Luan, Liangyu
    Li, Guorui
    Rong, Wang
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 584 - +
  • [4] Routeguard: An intrusion detection and response system for mobile ad hoc networks
    Hasswa, A
    Zulkernine, M
    Hassanein, H
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 336 - 343
  • [5] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [6] A ferry-based intrusion detection scheme for sparsely connected ad hoc networks
    Chuah, A.
    Yang, P.
    Han, J.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 525 - 532
  • [7] Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme
    Azer, Marianne A.
    El-Kassas, Sherif M.
    Hassan, Abdel Wahab F.
    El-Soudani, Magdy S.
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 636 - +
  • [8] Agent based intrusion tolerance scheme in ad hoc networks
    Kim, KJ
    Hong, SO
    Chang, TM
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 324 - 329
  • [9] An intrusion detection system for suburban ad hoc networks
    Islam, Muhammad Mahmudul
    Pose, Ronald
    Kopp, Carlo
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 47 - +
  • [10] An architecture for resilient intrusion detection in ad -hoc networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53