DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET

نویسندگان

  • Chinyang Henry Tseng
  • Shiau-Huey Wang
  • Calvin Ko
  • Karl N. Levitt
چکیده

A Mobile Ad Hoc Network (MANET) is a distributed communication platform for mobile wireless nodes. Because of the lack of a centralized monitoring point, intrusion detection systems (IDS) for MANET are usually developed using a distributed architecture where detectors are deployed at each node to cooperatively detect attacks. However, most of these distributed IDS simply assume that each detector exchanges complete information with their peers instead of establishing an efficient message exchanging protocol among detectors. We propose a Distributed Evidencedriven Message Exchanging intrusion detection Model (DEMEM) for MANET that allows the distributed detector to cooperatively detect routing attacks with minimal communication overhead. The framework allows detectors to exchange evidences only when necessary. Under a few practical assumptions, we implement DEMEM to detect routing attacks the Optimal Link State Routing (OLSR) protocol. The example scenarios and performance metrics in the experiment demonstrate that DEMEM can detect routing attacks with low message overhead and delay, no false negatives, and very low false positives under various mobility conditions with message lost. Our ongoing works include implementing DEMEM in AODV, DSR and TBRPF, and a reputation-based cooperative intrusion response model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks Distributed Intrusion Detection Models for Mobile Ad Hoc Networks

A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Tactical Manet Attack Detection Based on Fuzzy Sets Using Agent Communication

This study describes a distributed attack detection approach for a tactical MANET using intelligent agents equipped with inference systems based on fuzzy logic. The results produce a prototype intrusion detection system capable of effectively detecting attacks in a tactical MANET with accuracy approaching 95%. The attack recognition system is implemented using stationary intelligent fuzzy agent...

متن کامل

An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange

In a distributed intrusion detection system, multiple detection components are usually applied to monitor different hosts and network resources. The components sometimes need to cooperate with one another to perform complex detection tasks. However, the heterogeneity of the detection components greatly increases the complexity of the cooperation among the components. Therefore, a more general a...

متن کامل

Zone-Based Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to protect MANETs. However, the dynamic environment of MANETs makes the design and implementation of IDSs a very challenging task. In this paper, we present a non-overlapping Zone-Based Intrusion Detection System (ZBIDS) that fits...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006