Abstract
Manet security has a lot of open issues. Due to its characteristics, this kind of network needs preventive and corrective protection. In this paper, we focus on corrective protection proposing an anomaly IDS model for Manet. The design and development of the IDS are considered in our 3 main stages: normal behavior construction, anomaly detection and model update. A parametrical mixture model is used for behavior modeling from reference data. The associated Bayesian classification leads to the detection algorithm. MIB variables are used to provide IDS needed information. Experiments of DoS and scanner attacks validating the model are presented as well.
Chapter PDF
Similar content being viewed by others
Keywords
- Gaussian Mixture Model
- Intrusion Detection
- Anomaly Detection
- Intrusion Detection System
- Bayesian Classification
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Yang, H., Luo, H., Fan, Y., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. In: IEEE Wireless Communications, February 2004, pp. 2–11 (2004)
Puttini, R., de Sousa, R., Me, L.: Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. In: Proceedings of 1st International Conference on Wireless On-demand Network Systems in Lecture Notes on Computer Science. Springer, Heidelberg (2004)
Puttini, R., Marrakchi, Z., Mé, L.: Bayesian Classification Model for Real-Time Intrusion Detection. In: 22th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering (MAXENT 2002) (August 2002)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: Proceedings of 6th ACM Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), pp. 275–283. ACM Press, New York (2000)
Mittal, V., Vigna, G.: Sensor-based intrusion detection for intra-domain distance-vector routing. In: Sandhu, R. (ed.) Proceedings of the ACM Conference on Computer and Communication Security (CCS 2002). ACM Press, Washington (2002)
Puttini, R., Percher, J.M., Me, L., de Sousa, R.: A Fully Distributed IDS for Manet. In: Proceedings of 9th IEEE International Symposium on Computers Communications (2004)
Vigna, G., Gwalani, S., Srinivasan, K., Royer, E., Kemmerer, R.: A Intrusion detection tool for AODV-based ad hoc wireless network. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189. Springer, Heidelberg (2004)
Yang, H., Meng, X., Lu, S.: Self-Organized Network Layer Security in Mobile Ad Hoc Networks. In: The Proceedings of ACM Workshop on Wireless Security – 2002 (WiSe 2002), in conjunction with the ACM MOBICO 2002 (September 2002)
Huang, Y., Fan, W., Lee, W., Yu, P.: Cross-feature analysis for detecting ad-hoc routing anomalies. In: The 23rd International Conference on Distributed Computing Systems (May 2003)
Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for AODV. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003) (October 2003)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA (August 2000)
McLachlan, G.J., Peel, D., Basford, K.E., Adams, P.: The EMMIX Software for the Fitting of Mixtures of Normal and t –Components. Journal of Statistical Software 04 (1999)
Dempster, A.P., Laird, N.M., Rubin, D.B.: Journal of the Royal Statistical Society B, 39, pp. 1–38 (1977)
Roberts, S.J., Everson, R., Rezek, I.: Pattern Recognition, 33, pp. 833–839 (1999)
Johnson, R.A., Wichern, D.A., Wichern, D.W.: Applied Multivariate Statistical Analysis, 4th edn. Prentice-Hall, Englewood Cliffs (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Puttini, R., Hanashiro, M., Miziara, F., de Sousa, R., García-Villalba, L.J., Barenco, C.J. (2006). On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments. In: Cuenca, P., Orozco-Barbosa, L. (eds) Personal Wireless Communications. PWC 2006. Lecture Notes in Computer Science, vol 4217. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11872153_16
Download citation
DOI: https://doi.org/10.1007/11872153_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45174-7
Online ISBN: 978-3-540-45176-1
eBook Packages: Computer ScienceComputer Science (R0)