CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.
DOI: 10.1109/ccnc.2006.1593101
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion and anomaly detection model exchange for mobile ad-hoc networks

Abstract: Mobile Ad-hoc NETworks (MANETs) pose unique security requirements and challenges due to their reliance on open, peer-to-peer models that often don't require authentication between nodes. Additionally, the limited processing power and battery life of the devices used in a MANET also prevent the adoption of heavy-duty cryptographic techniques. While traditional misuse-based Intrusion Detection Systems (IDSes) may work in a MANET, watching for packet dropouts or unknown outsiders is difficult as both occur freque… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…In [63] Cretu et al proposed an anomaly detection approach for MANETs in which they model device behaviour, which peers can then use to determine the trustworthiness of other nodes. They examine their approach through an anomalous payload detector: the training phase observes payloads and then aggregates them from different nodes to build profiles which are compared by forming a similarity matrix.…”
Section: ) Anomaly-based Intrusion Detection Proposalsmentioning
confidence: 99%
“…In [63] Cretu et al proposed an anomaly detection approach for MANETs in which they model device behaviour, which peers can then use to determine the trustworthiness of other nodes. They examine their approach through an anomalous payload detector: the training phase observes payloads and then aggregates them from different nodes to build profiles which are compared by forming a similarity matrix.…”
Section: ) Anomaly-based Intrusion Detection Proposalsmentioning
confidence: 99%
“…In [8] Hijazi and Nasser studied and analysed the feasibility of mobile agents in MANETs and they concluded that many mobile agents' features are the exact requirement for MANET IDS. In [9] Cretu et al proposed an anomaly detection approach for MANETs in which it models device behavior that peers can use to determine trustworthiness of other nodes. Jiang and Wang [10] proposed an anomaly detection algorithm based on Markov chains for wireless ad hoc networks.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…The use of model comparison to perform anomaly and intrusion detection has been used in selected networking domains (e.g., mobile ad-hoc networks [35]). In our case, the problem is simpler since our model is derived from a protocol description or the actual binary of the protocol implementation.…”
Section: Related Workmentioning
confidence: 99%