1997
DOI: 10.1109/49.622919
|View full text |Cite
|
Sign up to set email alerts
|

IDAMN: an intrusion detection architecture for mobile networks

Abstract: -In this paper we present IDAMN, a distributed system whose main functionality is to track and detect mobile intruders in real-time. IDAMN includes two algorithms which model the behaviour of users in terms of both telephony activity and migration pattern. The main novelty of our architecture is its ability to perform intrusion detection in the visited location and within the duration of a typical call as opposed to existing designs that require the reporting of all call data to the home location in order to p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 59 publications
(36 citation statements)
references
References 11 publications
0
36
0
Order By: Relevance
“…Any deviation between the current calling session and the historical profile that exceeds a threshold, is identified as an intrusion. Several studies were proposed by using this procedure, such as the European ASPECT (Advanced Security for Personal Communication Technologies) project [5], [6], and [7].…”
Section: Behaviour Based Mobile Idsmentioning
confidence: 99%
“…Any deviation between the current calling session and the historical profile that exceeds a threshold, is identified as an intrusion. Several studies were proposed by using this procedure, such as the European ASPECT (Advanced Security for Personal Communication Technologies) project [5], [6], and [7].…”
Section: Behaviour Based Mobile Idsmentioning
confidence: 99%
“…Finally, they came up with a unified intrusion detection model. Samfat and Molva [5] propose architecture for mobile networks -IDAMN and they use anomaly detection methods as well as rule-based methods. There are three levels of detection; Location based detection (user located at two different locations at the same time), traffic anomaly detection (extremely low or extremely high levels network traffic), and the detection of anomalous behavior of specific mobile phone user.…”
Section: Related Workmentioning
confidence: 99%
“…IDAMN: Samfat et.al [3] 1997 proposed Intrusion detection architecture for mobile networks. Their systems main functionality is its ability to perform intrusion detection in the visited location and within the duration of a typical call.…”
Section: Related Workmentioning
confidence: 99%