Academia.eduAcademia.edu

Outline

A Survey on MANET Intrusion Detection

Abstract

In recent years, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to be attacked than wired network. These vulnerabilities are nature of the MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operation. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to "detect and response" these newer attacks, i.e. "intrusion detection". This paper aims to explore and to classify current techniques of Intrusion Detection System (IDS) aware MANET. To support these ideas, a discussion regarding attacks, IDS architectures, and researches achievement on MANET are presented inclusively, and then the comparison among several researches achievement will be evaluated based on these parameters. By this way, several existing security problems on MANET can be probed quickly for future researches.

References (49)

  1. REFERENCES
  2. D.B. Johnson, D.A. Maltz, et.al. "The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR)". Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress, 2002
  3. T. Clausen, P. Jaquet, et.al. "Optimized link state routing protocol". Internet Draft, draft-ietf- manet-olsr-06.txt, work in progress, 2001
  4. C.E. Perkins, P. Bhagwat. "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers". SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, 1994
  5. C.E Perkins, E. Belding-Royer. "Ad hoc On-demand Distance Vector (AODV)", Request For Comments (RFC) 3561, 2003
  6. C. Endorf, E. Schultz and J. Mellander, "Intrusion Detection & Prevention", McGraw-Hill, ISBN: 0072229543 (2004)
  7. J. P. Anderson. "Computer Security Threat Monitoring and Surveillance". Technical Report, James P. Anderson Co., Fort Washington, PA, 1980
  8. D.E. Denning, "An Intrusion-Detection Model". IEEE Transactions on Software Engineering, pp. 222-231, 1987
  9. L. Heberlein, G. Dias, et.al. "A network security monitor". In Proceedings of the IEEE Symposium on Security and Privacy, pp. 296-304, 1990
  10. A. Hijazi and N. Nasser. "Using Mobile Agents for Intrusion Detection in Wireless Ad Hoc Networks". In Wireless and Optical Communications Networks (WOCN), 2005
  11. T. F. Lunt, R. Jagannathan, et al. "IDES: The Enhanced Prototype C a Realtime Intrusion- Detection Expert System". Technical Report SRI-CSL-88-12, SRI International, Menlo Park, CA, 1988
  12. M. Esposito, C. Mazzariello, et.al. "Evaluating Pattern Recognition Techniques in Intrusion Detection Systems". The 7th International Workshop on Pattern Recognition in Information Systems, pp. 144-153, 2005
  13. S. Kumar and E. Spafford, "A Pattern Matching Model for Misuse Intrusion Detection". The 17th National Computer Security Conference, pp. 11-21, 1994
  14. P.A. Porras and R. Kemmerer, "Penetration State Transition Analysis C a Rule-Based Intrusion Detection Approach". The 8th Annual Computer Security Application Conference, pp. 220-229, 1992
  15. P. Porras and A. Valdes, "Live Traffic Analysis of TCP/IP Gateways". ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1998
  16. H. Debar, M. Becker and D. Siboni. "A Neural Network Component for an Intrusion Detection System". Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 240-250, 1992
  17. S. Forrest, S.A. Hofmeyr, and A. Somayaji. "Computer Immunology". Communications of the ACM, pp. 88-96, 1997
  18. N. Ye, X. Li, et.al. "Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data". IEEE Transactions on Systems, Man, and Cybernetics, pp. 266-274, 2001
  19. W. Lee, S.J. Stolfo, K.W. Mok. "A Data Mining Framework for Building Intrusion Detection Models". IEEE Symposium on Security and Privacy (Oakland, California), 1999
  20. G. Florez, S.M. Bridges, and R.B. Vaughn, "An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection". The North American Fuzzy Information Processing Society Conference, New Orleans, LA, 2002
  21. H. Debar, M. Dacier, and A.Wespi, "A Revised Taxonomy for Intrusion-Detection Systems". Annales des Telecommunications, pp. 361-378, 2000
  22. A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, "Handbook of Applied Cryptography". CRC Press, Inc., USA (2001)
  23. A. Mishra, K. Nadkarni, and A. Patcha. "Intrusion Detection in Wireless Ad Hoc Networks". IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, 2004
  24. L. Zhou and Z. J. Haas. "Securing ad hoc networks". IEEE Network Magazine , 1999
  25. Y. Zhang, W. Lee, and Y. Huang. "Intrusion Detection Techniques for Mobile Wireless Networks". Wireless Networks Journal (ACM WINET), 9(5): 545-556, 2003.
  26. E.C.H. Ngai, M.R. Lyu, R.T. Chin. "An authentication service against dishonest users in mobile ad hoc networks", IEEE Proceedings on Aerospace Conference, vol. 2, pp. 1275- 1285 2004.
  27. L. Blazevic et al. "Self-organization in mobile ad-hoc networks: the approach of terminodes", IEEE Communications Magazine , pp. 166-173, 2001
  28. W. Zhang, R. Rao, et. al. "Secure routing in ad hoc networks and a related intrusion detection problem", IEEE Military Communications Conference (MILCOM), vol. 2, 13-16 p. 735-740, 2003
  29. J. Kong et al. "Adaptive security for multi-layer ad-hoc networks". Special Issue of Wireless Communications and Mobile Computing, John Wiley Inter Science Press (2002)
  30. P. Kyasanur, N. Vaidya. "Detection and handling of MAC layer misbehavior in wireless networks". International Conference on Dependable Systems and Networks. pp. 173-182, 2003
  31. Y. Zhang, W. Lee, "Intrusion detection in wireless ad-hoc networks", The 6th Annual International Conference on Mobile Computing and Networking, pp. 275-283, 2000
  32. Y. Hu, A. Perrig, and D. Johnson. "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks". In Proceedings of IEEE INFOCOM'03, 2003
  33. Y. Hu, A. Perrig, D. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks". ACM MOBICOM, 2002
  34. Y. Hu, A. Perrig, and D. Johnson. "Rushing attacks and defense in wireless ad hoc network routing protocols". In Proceedings of ACM MobiCom Workshop -WiSe'03, 2003
  35. J. R. Douceur. "The sybil attack". The 1st International Workshop on Peer-to-Peer Systems pp. 251-260, 2002.
  36. J. Hubaux, L. Buttya´n, S. Capkun, "The quest for security in mobile ad hoc networks." The 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001
  37. P. Papadimitratos, Z.J. Haas, E.G. Sirer, "Path set selection in mobile ad hoc networks", The Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 1-11, 2002
  38. B. DeCleene et al. "Secure group communications for wireless networks". IEEE Military Communications Conference, 2001.
  39. S. Bo, W. Kui, U.W. Pooch. "Towards adaptive intrusion detection in mobile ad hoc networks". IEEE Global Telecommunications Conference, pp. 3551-3555, 2004
  40. C. Douligeris, A. Mitrokosta, "DDoS attacks and defense mechanisms: classification and state-of-the-art". Computer Networks: The International Journal of Computer and Telecommunications Networking 44 (5):643-666, 2004
  41. C.M. Chlamtac, J.J.-N. Liu, "Mobile ad hoc networking: imperatives and challenges", Ad Hoc Networks 1, 2003
  42. H. Yang, H.Y. Luo, et.al. "Security in Mobile Ad Hoc networks: challenges and solutions". IEEE Wireless Communications, pp.38-47, 2004.
  43. C. Krugel and T. Toth. "Applying mobile agent technology to intrusion detection". In ICSE Workshop on Software Engineering and Mobility, 2001.
  44. T. Anantvalee and J. Wu. "A Survey on Intrusion Detection in Mobile Ad Hoc Networks", Book Series Wireless Network Security, Springer, pp. 170 -196, ISBN: 978-0-387-28040-0 (2007)
  45. P. Albers, O. Camp, et al. "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches". Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002
  46. O. Kachirski, R. Guha. "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks." Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), IEEE, 2003
  47. D. Sterne, P. Balasubramanyam, et al. "A General Cooperative Intrusion Detection Architecture for MANETs". In Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, 2005
  48. B. Sun, K.Wu, and U. W. Pooch. "Alert Aggregation in Mobile Ad Hoc Networks". The 2003 ACM Workshop on Wireless Security in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78, 2003
  49. C. Ko, J. Rowe, P. Brutch, K. Levitt, "System Health and Intrusion Monitoring Using a hierarchy of Constraints". In Proceedings of 4th International Symposium, RAID, 2001