Anomaly-Based Intrusion Detection System for Ad hoc Networks

被引:0
|
作者
Korba, Abdelaziz Amara [1 ,2 ]
Nafaa, Mehdi [1 ]
Ghamri-Doudane, Yacine [2 ]
机构
[1] Univ Badji Mokhtar Annaba, Networks & Syst Lab, Annaba, Algeria
[2] Univ La Rochelle, L3I, La Rochelle, France
关键词
Ad hoc networks; Security; Intrusion detection; Anomaly-based detection; Wormhole; Rushing; Malicious node; MANETS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a new protection mechanism to secure routing in ad hoc networks. Wormhole and rushing attacks are very difficult to detect and can drastically degrade the network performance if they are combined with other attacks. Therefore, we propose an anomaly-based intrusion detection system to detect and prevent these attacks. The proposed mechanism uses a statistical approach that keeps track of node's route selection rate to identify and isolate malicious nodes from the network. The simulation results show that the proposed mechanism exhibits high detection rate.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Performance Analysis and Comparison of Anomaly-based Intrusion Detection in Vehicular Ad hoc Networks
    Shams, Erfan A.
    Ulusoy, Ali Hakan
    Rizaner, Ahmet
    [J]. RADIOENGINEERING, 2020, 29 (04) : 664 - 671
  • [2] Combining Passive Autoconfiguration and Anomaly-based Intrusion Detection in Ad-hoc Networks
    Schuhmann, Stephan
    Voelker, Lars
    [J]. ASWN 2008: EIGHTH INTERNATIONAL WORKSHOP ON APPLICATIONS AND SERVICES IN WIRELESS NETWORKS, PROCEEDINGS, 2008, : 87 - +
  • [3] Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks
    Cabrera, Joao B. D.
    Gutierrez, Carlos
    Mehra, Raman K.
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1831 - 1837
  • [4] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    [J]. 11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [5] Anomaly-based Behavioral Detection in Mobile Ad-Hoc Networks
    Meddeb, Rahma
    Jemili, Farah
    Triki, Bayrem
    Korbaa, Ouajdi
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 77 - 86
  • [6] An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Porfyrakis, Kyriakos
    Ribeiro, Jose C.
    Rodriguez, Jonathan
    [J]. ELECTRONICS, 2021, 10 (21)
  • [7] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [8] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [9] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    [J]. WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [10] DESIGN AND IMPLEMENTATION OF AN ANOMALY-BASED INTRUSION DETECTION SYSTEM FOR WIRELESS INDUSTRIAL NETWORKS
    Wei, Min
    Kim, Keecheon
    Wang, Ping
    [J]. FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 879 - 886