Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
A fully distributed IDS for MANET
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Route Manipulation Attack in Wireless Mesh Networks
AINA '11 Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
An event-based packet dropping detection scheme for wireless mesh networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.00 |
Wireless ad hoc network is an emerging technology that is gaining popularity as a cost-effective way of offering end-to-end services, such as Internet access, in an inexpensive, practical, and fast manner. However, wireless ad hoc networks are particularly vulnerable to extern and insider attacks due to their very intrinsic nature such as shared wireless medium and decentralized architecture. In this paper, we present a distributed intrusion detection approach, which is based on exchange of events and cooperation between the participating nodes. The proposed mechanism relies on non-intrusive traffic monitoring at each node, which generates network events. These events are processed by the intrusion detection system that is able to instantly signalize malicious activities, for instance, a node disseminating fake routing information through the network. We demonstrate the approach efficiency for detecting misbehaving nodes through a virtualized network environment that consists of virtual nodes interconnected which represent the network topology.