IEEE Transactions on Software Engineering - Special issue on computer security and privacy
C4.5: programs for machine learning
C4.5: programs for machine learning
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
A cluster-based approach for routing in dynamic networks
ACM SIGCOMM Computer Communication Review
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Location-aided routing (LAR) in mobile ad hoc networks
Wireless Networks
Ad hoc networking: an introduction
Ad hoc networking
The Ad Hoc on-demand distance-vector protocol
Ad hoc networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
An integrated environment for testing mobile ad-hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Sensor-based intrusion detection for intra-domain distance-vector routing
Proceedings of the 9th ACM conference on Computer and communications security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Statistical Anomaly Detection for Link-State Routing Protocols
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
IEEE Network: The Magazine of Global Internetworking
Mobility-based anomaly detection in cellular mobile networks
Proceedings of the 3rd ACM workshop on Wireless security
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets
Data Mining and Knowledge Discovery
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Classifier ensembles: Select real-world applications
Information Fusion
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
A hybrid data mining anomaly detection technique in ad hoc networks
International Journal of Wireless and Mobile Computing
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Balancing intrusion detection resources in ubiquitous computing networks
Computer Communications
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
DoS detection in cluster-based sensor networks
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
SWCA: a secure weighted clustering algorithm in wireless ad hoc networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Human interface for cyber security anomaly detection systems
HSI'09 Proceedings of the 2nd conference on Human System Interactions
An intrusion detection system in ad hoc networks: a social network analysis approach
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A dynamic intrusion detection hierarchy for MANETs
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
A certificate revocation scheme for space network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
A trust approach for node cooperation in MANET
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
MPC: mitigating stealthy power control attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Static analysis of executables for collaborative malware detection on android
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
On achieving cost-sensitive anomaly detection and response in mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A novel architecture of intrusion detection system
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Anomaly detection and mitigation for disaster area networks
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
A Context Adaptive Intrusion Detection System for MANET
Computer Communications
A Fair and Secure Cluster Formation Process for Ad Hoc Networks
Wireless Personal Communications: An International Journal
Priming: making the reaction to intrusion or fault predictable
Natural Computing: an international journal
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless Personal Communications: An International Journal
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Zone-Based clustering for intrusion detection architecture in ad-hoc networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
A robust SNMP based infrastructure for intrusion detection and response in tactical MANETs
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Mitigating route request flooding attacks in mobile ad hoc networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Adaptive algorithms to enhance routing and security for wireless PAN mesh networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
A novel IDS agent distributing protocol for MANETs
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Research on secure data collection in wireless multimedia sensor networks
Computer Communications
Evaluation of classification algorithms for intrusion detection in MANETs
Knowledge-Based Systems
Information Sciences: an International Journal
Journal of Network and Computer Applications
Journal of Network and Systems Management
An event-based packet dropping detection scheme for wireless mesh networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents
The Journal of Supercomputing
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. Building on our prior work on anomaly detection, we investigate how to improve the anomaly detection approach to provide more details on attack types and sources. For several well-known attacks, we can apply a simple rule to identify the attack type when an anomaly is reported. In some cases, these rules can also help identify the attackers. We address the run-time resource constraint problem using a cluster-based detection scheme where periodically a node is elected as the ID agent for a cluster. Compared with the scheme where each node is its own ID agent, this scheme is much more efficient while maintaining the same level of effectiveness. We have conducted extensive experiments using the ns-2 and MobiEmu environments to validate our research.