Utilizing the uncertainty of intrusion detection to strengthen security for ad hoc networks

被引:0
|
作者
Dreef, D
Ahari, S
Wu, K
King, V
机构
[1] Univ Victoria, Dept Comp Sci, STN CSC, Victoria, BC V8W 3P6, Canada
[2] Microsoft Corp, Redmond, WA 98052 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With Mobile ad hoc networks rapidly approaching practical use by the masses, security has become a main concern. Intrusion detection, as the second line of defense, is an indispensable tool for highly survivable networks. Nevertheless, intrusion detection systems suffer from false alarms, which are extremely hard to control in mobile ad hoc networks. As a result, local intrusion detection engines in mobile ad hoc networks may only be able to claim anomaly with low confidence. Such uncertain knowledge is not very helpful in assisting end users with the final decision for intrusion response. The uncertainty of intrusion detection results, however, can provide a rough guideline on potential hazards and can be utilized to enhance security. In this paper, we present a randomized algorithm to utilize such uncertain knowledge to help routing protocols defend against the rushing attack. By eliminating excess bandwidth usage and adopting an adaptive randomized forwarding mechanism, the presented method is more efficient than previously existing solutions.
引用
收藏
页码:82 / 95
页数:14
相关论文
共 50 条
  • [1] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [2] An intrusion detection system for suburban ad hoc networks
    Islam, Muhammad Mahmudul
    Pose, Ronald
    Kopp, Carlo
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 47 - +
  • [3] An architecture for resilient intrusion detection in ad -hoc networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [4] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [5] Intrusion detection techniques in wireless ad hoc networks
    Wang, Xia
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 347 - 349
  • [6] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [7] A scheme for intrusion detection and response in ad hoc networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 507 - +
  • [8] Hybrid Intrusion Detection Framework for Ad hoc networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghanemi, Salim
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (04) : 1 - 32
  • [9] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [10] RIDA: Robust intrusion detection in ad hoc networks
    Subhadrabandhu, D
    Sarkar, S
    Anjum, F
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 1069 - 1082