Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
REALMAN '06 Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality
Secure Distributed Cluster Formation in Wireless Sensor Networks
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Creating and maintaining a good intrusion detection hierarchy in dynamic ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
ANMP: ad hoc network management protocol
IEEE Journal on Selected Areas in Communications
Distributed algorithms for the creation of a new distributed IDS in MANETs
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Algorithms for a distributed IDS in MANETs
Journal of Computer and System Sciences
Hi-index | 0.00 |
MANETs lack natural concentration points at which a single dedicated node can monitor all network traffic for intrusions. Consequently, detecting attacks on MANETs requires distributed, cooperative intrusion detection techniques. We examine an approach to organizing a cooperative intrusion detection system for MANETs as a dynamic hierarchy that adapts to changes in topology and other environmental factors. We describe the rationale for this approach, the design of a set of hierarchy services to support it, and our experience developing prototype intrusion detection components that utilize these services.