Utilizing the uncertainty of intrusion detection to strengthen security for ad hoc networks

被引:0
|
作者
Dreef, D
Ahari, S
Wu, K
King, V
机构
[1] Univ Victoria, Dept Comp Sci, STN CSC, Victoria, BC V8W 3P6, Canada
[2] Microsoft Corp, Redmond, WA 98052 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With Mobile ad hoc networks rapidly approaching practical use by the masses, security has become a main concern. Intrusion detection, as the second line of defense, is an indispensable tool for highly survivable networks. Nevertheless, intrusion detection systems suffer from false alarms, which are extremely hard to control in mobile ad hoc networks. As a result, local intrusion detection engines in mobile ad hoc networks may only be able to claim anomaly with low confidence. Such uncertain knowledge is not very helpful in assisting end users with the final decision for intrusion response. The uncertainty of intrusion detection results, however, can provide a rough guideline on potential hazards and can be utilized to enhance security. In this paper, we present a randomized algorithm to utilize such uncertain knowledge to help routing protocols defend against the rushing attack. By eliminating excess bandwidth usage and adopting an adaptive randomized forwarding mechanism, the presented method is more efficient than previously existing solutions.
引用
收藏
页码:82 / 95
页数:14
相关论文
共 50 条
  • [41] Security in ad hoc networks
    Molva, R
    Michiardi, P
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 756 - 775
  • [42] Routeguard: An intrusion detection and response system for mobile ad hoc networks
    Hasswa, A
    Zulkernine, M
    Hassanein, H
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 336 - 343
  • [43] An EFSM-based intrusion detection system for ad hoc networks
    Orset, JM
    Alcalde, B
    Cavalli, A
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2005, 3707 : 400 - 413
  • [44] Dempster-Shafer theory for intrusion detection in ad hoc networks
    Chen, TM
    Venkataramanan, V
    IEEE INTERNET COMPUTING, 2005, 9 (06) : 35 - 41
  • [45] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [46] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [47] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [48] Secure routing in ad hoc networks and a related intrusion detection problem
    Zhang, WS
    Rao, R
    Cao, GH
    Kesidis, G
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 735 - 740
  • [49] Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
    Sen, Sevil
    Clark, John A.
    COMPUTER NETWORKS, 2011, 55 (15) : 3441 - 3457
  • [50] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432