Using Mobility Profiles for Anomaly-based Intrusion Detection in Mobile Networks

نویسندگان

  • Jeyanthi Hall
  • Michel Barbeau
  • Evangelos Kranakis
چکیده

The high rate of false alarms, which results from the use of anomaly-based intrusion detection (ABID) in mobile networks, can be addressed by combining observations across time and across domains. When ABID is carried out using a single profile, multiple observations can be correlated in time using a state-probabilistic model such as Bayes filters [1]. Furthermore, using a statistical tool such as multivariate analysis [2], the detection results, obtained using multiple profiles from different domains, can also be combined to further reduce the rate of false alarms. Examples of intrusion detection systems (IDSs), which make use of multi-sensor data for enhanced detection, include AAFID by Balasubramaniyan et al. [3] and EMERALD by Porras and Neumann [4]. To date, the use of different profiles for ABID has been investigated by various groups. Node/device profiles are created by exploiting the unique hardware signature of their wireless interface, operating system (proposed by Taleck [5]) and other characteristics of a wireless device. In terms of userbased profiling, the use of calling patterns for fraud detection in cellular networks is explored by Boukerche et al. [6]. In addition, commercial systems, namely the Fraud Management System by Hewlett-Packard (FMS-HP) [7] and Compaq (FMSC) [8] also make use of service usage profiles. The focus of this research is to examine the feasibility of using mobility profiles for enhancing ABID in mobile networks. In particular, a unique classification approach, using an instance based learning (IBL) technique [9], is adopted. In addition, we focus on the analysis of two key system parameters in order to determine their impact on the false alarm and detection rates. Finally, simulations, which were conducted, are based on location broadcasts (LBs) from users, who make use of public transportation, e.g. bus in Los Angeles. This environment promotes a high probability of intrusions, a necessary prerequisite for a meaningful analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Cluster Based Cost Efficient Intrusion Detection System For Manet

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are a...

متن کامل

Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks

The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile ad hoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention mechanisms, such as encryption and authentic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005