Detecting critical nodes for MANET intrusion detection systems

A. Karygiannis, E. Antonakakis, A. Apostolopoulos
{"title":"Detecting critical nodes for MANET intrusion detection systems","authors":"A. Karygiannis, E. Antonakakis, A. Apostolopoulos","doi":"10.1109/SECPERU.2006.8","DOIUrl":null,"url":null,"abstract":"Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained environment. Detecting malicious nodes in an open ad hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad hoc network does not have these types of network elements where the intrusion detection system (IDS) can collect and analyze audit data for the entire network. A number of neighbor-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad hoc networks. The resources consumed by ad hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. This paper presents a method for determining conditions under which critical nodes should be monitored, describes the details of a critical node test implementation, presents experimental results, and offers a new approach for conserving the limited resources of an ad hoc network IDS","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"64","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECPERU.2006.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 64

Abstract

Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained environment. Detecting malicious nodes in an open ad hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad hoc network does not have these types of network elements where the intrusion detection system (IDS) can collect and analyze audit data for the entire network. A number of neighbor-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad hoc networks. The resources consumed by ad hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. This paper presents a method for determining conditions under which critical nodes should be monitored, describes the details of a critical node test implementation, presents experimental results, and offers a new approach for conserving the limited resources of an ad hoc network IDS
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
MANET入侵检测系统关键节点检测
设计自组织路由协议是为了在面对网络拥塞、故障节点和动态变化的拓扑时有效地重新路由流量。响应式、主动式和混合自组织路由协议的共同设计目标是忠实地将数据包从源节点路由到目标节点,同时在资源受限的环境中保持令人满意的服务水平。在开放的自组织网络中检测恶意节点,其中的参与节点没有先前的安全关联,这给传统有线网络带来了许多挑战。有线网络中的流量监控通常在交换机、路由器和网关上执行,但是自组织网络没有这些类型的网络元素,入侵检测系统(IDS)可以在这些网络元素中收集和分析整个网络的审计数据。研究中提出了许多邻居监控、信任建立和基于集群的投票方案,以实现自组织网络中恶意活动的检测和报告。但是,用于监视、检测、报告和诊断恶意活动的特设网络成员节点所消耗的资源可能比简单地通过不同的可用路径重新路由数据包要多。本文提出了一种确定关键节点监控条件的方法,描述了关键节点测试实现的细节,给出了实验结果,为节省自组织网络IDS有限的资源提供了一种新的方法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An effective approach for accurate estimation of trust of distant information sources in the semantic Web HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks A hash-based pseudonymization infrastructure for RFID systems iHIDE: hiding sources of information in WSNs Service-Oriented Security Architecture for CII based on Sensor Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1