A Survey on MANET Intrusion Detection
Abstract
In recent years, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to be attacked than wired network. These vulnerabilities are nature of the MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operation. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to "detect and response" these newer attacks, i.e. "intrusion detection". This paper aims to explore and to classify current techniques of Intrusion Detection System (IDS) aware MANET. To support these ideas, a discussion regarding attacks, IDS architectures, and researches achievement on MANET are presented inclusively, and then the comparison among several researches achievement will be evaluated based on these parameters. By this way, several existing security problems on MANET can be probed quickly for future researches.
References (49)
- REFERENCES
- D.B. Johnson, D.A. Maltz, et.al. "The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR)". Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress, 2002
- T. Clausen, P. Jaquet, et.al. "Optimized link state routing protocol". Internet Draft, draft-ietf- manet-olsr-06.txt, work in progress, 2001
- C.E. Perkins, P. Bhagwat. "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers". SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, 1994
- C.E Perkins, E. Belding-Royer. "Ad hoc On-demand Distance Vector (AODV)", Request For Comments (RFC) 3561, 2003
- C. Endorf, E. Schultz and J. Mellander, "Intrusion Detection & Prevention", McGraw-Hill, ISBN: 0072229543 (2004)
- J. P. Anderson. "Computer Security Threat Monitoring and Surveillance". Technical Report, James P. Anderson Co., Fort Washington, PA, 1980
- D.E. Denning, "An Intrusion-Detection Model". IEEE Transactions on Software Engineering, pp. 222-231, 1987
- L. Heberlein, G. Dias, et.al. "A network security monitor". In Proceedings of the IEEE Symposium on Security and Privacy, pp. 296-304, 1990
- A. Hijazi and N. Nasser. "Using Mobile Agents for Intrusion Detection in Wireless Ad Hoc Networks". In Wireless and Optical Communications Networks (WOCN), 2005
- T. F. Lunt, R. Jagannathan, et al. "IDES: The Enhanced Prototype C a Realtime Intrusion- Detection Expert System". Technical Report SRI-CSL-88-12, SRI International, Menlo Park, CA, 1988
- M. Esposito, C. Mazzariello, et.al. "Evaluating Pattern Recognition Techniques in Intrusion Detection Systems". The 7th International Workshop on Pattern Recognition in Information Systems, pp. 144-153, 2005
- S. Kumar and E. Spafford, "A Pattern Matching Model for Misuse Intrusion Detection". The 17th National Computer Security Conference, pp. 11-21, 1994
- P.A. Porras and R. Kemmerer, "Penetration State Transition Analysis C a Rule-Based Intrusion Detection Approach". The 8th Annual Computer Security Application Conference, pp. 220-229, 1992
- P. Porras and A. Valdes, "Live Traffic Analysis of TCP/IP Gateways". ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1998
- H. Debar, M. Becker and D. Siboni. "A Neural Network Component for an Intrusion Detection System". Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 240-250, 1992
- S. Forrest, S.A. Hofmeyr, and A. Somayaji. "Computer Immunology". Communications of the ACM, pp. 88-96, 1997
- N. Ye, X. Li, et.al. "Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data". IEEE Transactions on Systems, Man, and Cybernetics, pp. 266-274, 2001
- W. Lee, S.J. Stolfo, K.W. Mok. "A Data Mining Framework for Building Intrusion Detection Models". IEEE Symposium on Security and Privacy (Oakland, California), 1999
- G. Florez, S.M. Bridges, and R.B. Vaughn, "An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection". The North American Fuzzy Information Processing Society Conference, New Orleans, LA, 2002
- H. Debar, M. Dacier, and A.Wespi, "A Revised Taxonomy for Intrusion-Detection Systems". Annales des Telecommunications, pp. 361-378, 2000
- A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, "Handbook of Applied Cryptography". CRC Press, Inc., USA (2001)
- A. Mishra, K. Nadkarni, and A. Patcha. "Intrusion Detection in Wireless Ad Hoc Networks". IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, 2004
- L. Zhou and Z. J. Haas. "Securing ad hoc networks". IEEE Network Magazine , 1999
- Y. Zhang, W. Lee, and Y. Huang. "Intrusion Detection Techniques for Mobile Wireless Networks". Wireless Networks Journal (ACM WINET), 9(5): 545-556, 2003.
- E.C.H. Ngai, M.R. Lyu, R.T. Chin. "An authentication service against dishonest users in mobile ad hoc networks", IEEE Proceedings on Aerospace Conference, vol. 2, pp. 1275- 1285 2004.
- L. Blazevic et al. "Self-organization in mobile ad-hoc networks: the approach of terminodes", IEEE Communications Magazine , pp. 166-173, 2001
- W. Zhang, R. Rao, et. al. "Secure routing in ad hoc networks and a related intrusion detection problem", IEEE Military Communications Conference (MILCOM), vol. 2, 13-16 p. 735-740, 2003
- J. Kong et al. "Adaptive security for multi-layer ad-hoc networks". Special Issue of Wireless Communications and Mobile Computing, John Wiley Inter Science Press (2002)
- P. Kyasanur, N. Vaidya. "Detection and handling of MAC layer misbehavior in wireless networks". International Conference on Dependable Systems and Networks. pp. 173-182, 2003
- Y. Zhang, W. Lee, "Intrusion detection in wireless ad-hoc networks", The 6th Annual International Conference on Mobile Computing and Networking, pp. 275-283, 2000
- Y. Hu, A. Perrig, and D. Johnson. "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks". In Proceedings of IEEE INFOCOM'03, 2003
- Y. Hu, A. Perrig, D. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks". ACM MOBICOM, 2002
- Y. Hu, A. Perrig, and D. Johnson. "Rushing attacks and defense in wireless ad hoc network routing protocols". In Proceedings of ACM MobiCom Workshop -WiSe'03, 2003
- J. R. Douceur. "The sybil attack". The 1st International Workshop on Peer-to-Peer Systems pp. 251-260, 2002.
- J. Hubaux, L. Buttya´n, S. Capkun, "The quest for security in mobile ad hoc networks." The 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001
- P. Papadimitratos, Z.J. Haas, E.G. Sirer, "Path set selection in mobile ad hoc networks", The Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 1-11, 2002
- B. DeCleene et al. "Secure group communications for wireless networks". IEEE Military Communications Conference, 2001.
- S. Bo, W. Kui, U.W. Pooch. "Towards adaptive intrusion detection in mobile ad hoc networks". IEEE Global Telecommunications Conference, pp. 3551-3555, 2004
- C. Douligeris, A. Mitrokosta, "DDoS attacks and defense mechanisms: classification and state-of-the-art". Computer Networks: The International Journal of Computer and Telecommunications Networking 44 (5):643-666, 2004
- C.M. Chlamtac, J.J.-N. Liu, "Mobile ad hoc networking: imperatives and challenges", Ad Hoc Networks 1, 2003
- H. Yang, H.Y. Luo, et.al. "Security in Mobile Ad Hoc networks: challenges and solutions". IEEE Wireless Communications, pp.38-47, 2004.
- C. Krugel and T. Toth. "Applying mobile agent technology to intrusion detection". In ICSE Workshop on Software Engineering and Mobility, 2001.
- T. Anantvalee and J. Wu. "A Survey on Intrusion Detection in Mobile Ad Hoc Networks", Book Series Wireless Network Security, Springer, pp. 170 -196, ISBN: 978-0-387-28040-0 (2007)
- P. Albers, O. Camp, et al. "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches". Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002
- O. Kachirski, R. Guha. "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks." Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), IEEE, 2003
- D. Sterne, P. Balasubramanyam, et al. "A General Cooperative Intrusion Detection Architecture for MANETs". In Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, 2005
- B. Sun, K.Wu, and U. W. Pooch. "Alert Aggregation in Mobile Ad Hoc Networks". The 2003 ACM Workshop on Wireless Security in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78, 2003
- C. Ko, J. Rowe, P. Brutch, K. Levitt, "System Health and Intrusion Monitoring Using a hierarchy of Constraints". In Proceedings of 4th International Symposium, RAID, 2001