A cluster-based approach for routing in dynamic networks
ACM SIGCOMM Computer Communication Review
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
A distributed efficient clustering approach for ad hoc and sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Graph-based methods for the analysis of large-scale multiagent systems
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Secure traffic data propagation in Vehicular Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Ensuring security in wireless ad hoc networks is absolutely necessary and a must for any securitycritical applications. In this paper, we report our progress in the development of an agent-based cooperative anomaly detection scheme for wireless ad hoc networks. The approach addresses the underlying distributed and cooperative nature of wireless ad hoc networks and adds one more dimension of cooperation to the intrusion detection process. That is, the anomaly detection is performed in a cooperative way involving the participation of multiple mobile nodes. Unlike traditional signature-based misuse detection approaches, the proposed scheme detects various types of intrusions/attacks based on the model learned only from normal network behaviors. Without the requirements of pre-labeled attack data, the approach eliminates the time-consuming labeling process and the impacts of imbalanced dataset. Besides, the concept of software agent technology has been applied in system implementation, which provides further support for distributed wireless ad hoc networks.