2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 200
DOI: 10.1109/sahcn.2004.1381907
|View full text |Cite
|
Sign up to set email alerts
|

Efficacy of misuse detection in adhoc networks

Abstract: We consider adhoc networks with multiple, mobile colluding intruders. We investigate the placement of the intrusion detection modules for misuse intrusion detection. Our goal is to maximize the detection performance subject to limitation in the computational resources. We mathematically formulate different detection objectives, and show that computing the optimal solution is NP-hard in each case. Thereafter, we propose a family of algorithms that approximate the optimal solution, and prove that some of these a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Refer to figure 1 for an example detection procedure. Now, all packets, except those that are directly transmitted from an intruder to its target (which usually constitutes a small fraction of the total number of packets [22] Due to the coverage redundancy several insiders may analyze a packet, and they may decide differently whether the packet is bad. The different decisions must be combined to determine whether the packet is indeed bad.…”
Section: Algorithms For Robust Intrusion Detectionmentioning
confidence: 99%
“…Refer to figure 1 for an example detection procedure. Now, all packets, except those that are directly transmitted from an intruder to its target (which usually constitutes a small fraction of the total number of packets [22] Due to the coverage redundancy several insiders may analyze a packet, and they may decide differently whether the packet is bad. The different decisions must be combined to determine whether the packet is indeed bad.…”
Section: Algorithms For Robust Intrusion Detectionmentioning
confidence: 99%
“…In this case, every packet transmitted by an insider would be analyzed at least once and every insider detects whether a packet is bad without any error. Only the packets transmitted directly from an intruder to its target may not be analyzed, but the percentage of such packets is small [9]. This suggests that when insiders may decide erroneously, the IDS active insiders must be selected so that every insider is a neighbor of at least k IDS active insiders where k > 1.…”
Section: Algorithms For Robust Intrusion Detectionmentioning
confidence: 99%
“…Therefore, a prerequisite for deploying misuse detection in ad hoc networks is to determine which nodes should execute the sniffing and analysis software modules which we refer to as the intrusion detection software (IDS) modules. Previous works have considered this problem assuming that the insider nodes that analyze the traffic detect malicious packets without any failure [8], [9], [10]. But some insiders periodically stop functioning because of operational failure and low residual energy and would not detect attacks during those intervals.…”
Section: Introductionmentioning
confidence: 99%
“…In this way, many researchers have been tried to propose appropriate solutions to make such environments more reliable than ever before. From the security viewpoint, a subset of mentioned solutions have been tried to prevent the considered environment from some categories of external attacks [1][2][3], while some others tried to detect possible threats and proposed some solutions to resist against [4][5][6]. If roughly speaking, it is possible to claim that the level of proposed secure protocols can be emphasizing on cryptographic protocols or as a higher level they can use other cryptographic functions as a building block to make the considered protocol.…”
Section: Introductionmentioning
confidence: 99%