{"title":"Combining Passive Autoconfiguration and Anomaly-Based Intrusion Detection in Ad Hoc Networks","authors":"S. Schuhmann, L. Volker","doi":"10.1109/ASWN.2008.14","DOIUrl":null,"url":null,"abstract":"Two essential services of ad-hoc networks are IP address autoconfiguration and intrusion detection systems. Since both autoconfiguration and intrusion detection may base their decisions on routing protocol anomalies, their interdependencies can cause problems. In this paper, we present our approach to efficiently combine autoconfiguration and intrusion detection, and present our enhancements in attack detection for an auto configuration system. We have identified anomalies indicating specific attacks, implemented suitable anomaly detectors, and evaluated our system. The results show that it is possible to detect both the attacks and IP address conflicts in an efficient way.","PeriodicalId":315904,"journal":{"name":"2008 Eighth International Workshop on Applications and Services in Wireless Networks (aswn 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Eighth International Workshop on Applications and Services in Wireless Networks (aswn 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASWN.2008.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Two essential services of ad-hoc networks are IP address autoconfiguration and intrusion detection systems. Since both autoconfiguration and intrusion detection may base their decisions on routing protocol anomalies, their interdependencies can cause problems. In this paper, we present our approach to efficiently combine autoconfiguration and intrusion detection, and present our enhancements in attack detection for an auto configuration system. We have identified anomalies indicating specific attacks, implemented suitable anomaly detectors, and evaluated our system. The results show that it is possible to detect both the attacks and IP address conflicts in an efficient way.