Milcom 2006 2006
DOI: 10.1109/milcom.2006.302010
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Sanitized Message Flows in a Cooperative Intrusion Warning System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In the TOpology Graph Based Anomaly Detection (TOGBAD) [59] developed for an Optimized Link State Routing (OLSR) protocol, a modified cluster-based anomaly detector [60,61] is employed to construct a topology graph based on the routing and data packets of all nodes, and compares this topology graph with the number of neighbors reported by each node for recognizing the black hole attack. First, a detector collects routing and data packets from each node, and constructs a topology graph.…”
Section: Detection Mechanisms Against Black Hole Attackmentioning
confidence: 99%
“…In the TOpology Graph Based Anomaly Detection (TOGBAD) [59] developed for an Optimized Link State Routing (OLSR) protocol, a modified cluster-based anomaly detector [60,61] is employed to construct a topology graph based on the routing and data packets of all nodes, and compares this topology graph with the number of neighbors reported by each node for recognizing the black hole attack. First, a detector collects routing and data packets from each node, and constructs a topology graph.…”
Section: Detection Mechanisms Against Black Hole Attackmentioning
confidence: 99%
“…Thus here, the number of neighbours in the HELLO messages is compared with that in the topology graph and a difference indicates misbehavior. A cluster based anomaly detector from the works [12] and [13] have been used in this technique. The round length in the detector has to be fixed as greater than the HELLO message interval.…”
Section: Black Hole Attack Detection Using Topology Graphsmentioning
confidence: 99%
“…M. Jahnke et.al. uses finite state machines for specifying the normal routing behavior in AODV routing protocol and the network is monitored for run time violations in a distributed manner [20]. These kinds of specification detections do not detect the intrusions but the effects of intrusion.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…This latter, which is the only node running the TOGBAD scheme, uses the received information to construct the network topology graph. This graph is built based on the Cluster-Based Anomaly Detector (CBAD) introduced in [20] and [35]. Next, upon reception of a message from a node, the supervisor node extracts the number of neighbors claimed by the sender node and compares it with the size of this sender's neighbor set as calculated from the topology graph.…”
Section: First Defense Line Schemesmentioning
confidence: 99%