Distributed Intrusion Detection Models for Mobile Ad Hoc Networks Distributed Intrusion Detection Models for Mobile Ad Hoc Networks
نویسندگان
چکیده
A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing information in a MANET, the node can easily paralyze the network or hijack valuable routes. Due to MANET’s particular routing characteristics, defending routing attacks is challenging and critical in MANET. Traditional cryptographic authentication schemes are not sufficient due to insider routing attacks. Intrusion detection systems are ideal for insider attacks, but most of them are designed for wired networks and thus they can neither directly deploy in MANETs nor effectively detect new routing attacks in MANET. So we apply specification based intrusion detection approach that defines normal behavior of the protected networks to detect new routing attacks in MANETs. Therefore, we proposed a complete distributed intrusion detection system that consists of four models for MANETs with formal reasoning and simulation experiments for evaluation. We first proposed two specification based intrusion detection models for AODV (Ad hoc On-demand Distance Vector) and OLSR (Optimized Link State Routing), which are the two representative routing protocols in MANET. Second, we proposed a Distributed Evidence-driven Message Exchanging intrusion detection Model (DEMEM), which provides a practical distributed intrusion detection and message exchange framework. And we implemented DEMEM with three ID messages to provide reliable message exchange platform for intrusion detection in OLSR. Third, we proposed Distributed Routing Evidence Tracing and Authentication intrusion prevention model (DRETA). DRETA consists of a low computation overhead authentication and a scalable integrity protection of forwarded routing messages in MANETs. Finally, DRETA integrates our other three models into one complete intrusion detec-
منابع مشابه
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل