Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
Challenges in Intrusion Detection for Wireless Ad-hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Intrusion Detection Based on Cross-Correlation of System Call Sequences
ICTAI '05 Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Intrusion Detection Techniques in Wireless Ad Hoc Networks
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
A Flexible Scheduling Framework for Deeply Embedded Systems
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
Embedded Intelligent Intrusion Detection: A Behavior-Based Approach
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
Quantum Computing Is Exciting and Important--Really!
Computing in Science and Engineering
Analysis of Payload Based Application level Network Anomaly Detection
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
IEEE Spectrum
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Enhancing efficiency of intrusion prediction based on intelligent immune method
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Security in the context of multi-agent systems
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Specification based intrusion detection for unmanned aircraft systems
Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
Computer Communications
A survey of intrusion detection techniques for cyber-physical systems
ACM Computing Surveys (CSUR)
Matrix-based pairwise key establishment for wireless mesh networks
Future Generation Computer Systems
Hi-index | 0.01 |
This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds to a specific function or behavior within the operational scenario of the network. A static set of behaviors is determined offline, and these behaviors are tracked dynamically during the operation of the network. During the first stage of the IDS, our detection strategy employs the analysis of global and local maxima in the probability density functions of the behaviors to isolate deviance at the granularity of a single node. This stage is used to capture the typical behavior of the network. The first stage also provides tuning and calibration for the second stage. During the second stage, a cross-correlative component is used to detect multiple threats simultaneously. Our approach distributes the IDS among all connected network nodes, allowing each node to identify potential threats individually. The combined result can detect deviant nodes in a scalable manner and can operate in the presence of a density of deviant nodes approaching 22%. Computational requirements are reduced to adapt optimally to embedded devices on an ad-hoc network.