Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1280940.1280965acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

Distributed and control theoretic approach to intrusion detection

Published: 12 August 2007 Publication History

Abstract

Ad hoc wireless networks are more vulnerable to malicious attacks than traditional wired networks due to the silent nature of these attacks and the inability of the conventional intrusion detection systems (IDS) to detect them. These attacks operate under the threshold boundaries during an intrusion attempt and can only be identified by profiling the complete system activity in relation to a normal behavior. In this paper we discuss a control-theoretic Hidden Markov Model (HMM) strategy for intrusion detection using distributed observations across multiple nodes. This model consists of a distributed HMM engine that executes in a randomly selected monitor node and functions as a part of the feedback control engine. This drives the defensive response based on hysteresis to reduce the frequency of false positives, thereby avoiding inappropriate ad hoc responses.

References

[1]
S. Ci, M. Guizani, H. H. Chen, and H. Sharif, "Self-regulating network utilization in mobile ad-hoc wireless networks," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1302--1310, July 2006.
[2]
X. Du, Y. Xiao, S. Guizani, and H. H. Chen, "A secure routing protocol for heterogeneous sensor networks, in Proc. IEEE Globecom'06, Nov. 2006, San Francisco, CA.
[3]
L.R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, pp. 257--286, Feb. 1989.
[4]
R. Khanna and H. Liu, "System approach to intrusion detection using hidden Markov model," in Proc. 2006 Int. Conf. Commun. and Mobile Comput. (IWCMC'06), July 2006, pp. 349--354.
[5]
S. S. Joshi and V. V. Phoha, "Investigating hidden Markov models capabilities in anomaly detection," in Proc. 43rd Annual Southeast Regional Conf. (ACM-SE 43), Kennesaw, GA, Mar. 2005, pp. 98--103.
[6]
A. Arnes, F. Valeur, G. Vigna, and R. Kemmerer, "Using hidden Markov models to evaluate the risks of intrusions: System architecture and model validation," in Proc. Int. Symp. Recent Advances in Intrusion Detection (RAID), Hamburg, Germany, Sep. 2006.
[7]
D. Ourston, S. Matzner, W. Stump, and B. Hopkins, "Applications of hidden Markov models to detecting multi-stage network attacks," in Proc. 36th Annual Hawaii Int. Conf. (System Sciences, 2003), Hamburg, Germany, Jan. 2003.
[8]
W. Wang, X.-H. Guan, and X.-L. Zhang, "Modeling program behaviors by hidden Markov models for intrusion detection," in Proc. Int. Conf. Machine Learning and Cybernetics, 2004, Aug. 2004, pp. 2830--2835.
[9]
S. Zanero, "Behavioral Intrusion Detection," in In ISCIS 2004, 2004.
[10]
D. Wagner and D. Dean, "Intrusion detection via static analysis," in Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, 2001.
[11]
S. Manganaris, M. Christensen, D. Serkle, and K. Hermix, "A data mining analysis of RTID alarms," 2nd Int. Workshop Recent Advances in Intrusion Detection, Purdue Univ., West Lafayette, Indiana, USA, Sep. 1999.
[12]
G. Widmer and M. Kubat, "Learning in the presence of concept drifting and hidden contexts," Machine Learning, vol. 23, pp. 69--101, 1996.
[13]
W. Fan, "Systematic data selection to mine concept drifting data streams," ACM SIGKDD, 2004.
[14]
S. Kullback and R. A. Leibler, "On information and sufficiency," Annals of Mathematical Statistics, vol. 22, pp. 79--86, Mar. 1951.
[15]
G. R. Grimmett and D. R. Stirzaker, Probability and random processes. Oxford, U.K.: Clarendon Press, 2nd edition, 1992.
[16]
T. K. Moon, "The expectation-maximization algorithm," IEEE Signal Processing Magazine, pp. 47--59, Nov. 1996.

Cited By

View all
  • (2013)DGM approach to network attacker and defender strategies8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)10.1109/ICITST.2013.6750213(313-320)Online publication date: Dec-2013
  • (2009)Reduced complexity intrusion detection in sensor networks using genetic algorithmProceedings of the 2009 IEEE international conference on Communications10.5555/1817271.1817383(598-602)Online publication date: 14-Jun-2009

Index Terms

  1. Distributed and control theoretic approach to intrusion detection

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
      August 2007
      716 pages
      ISBN:9781595936950
      DOI:10.1145/1280940
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 August 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IDS
      2. hidden markov models
      3. intrusion detection
      4. wireless ad-hoc networks

      Qualifiers

      • Article

      Conference

      IWCMC07
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 31 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2013)DGM approach to network attacker and defender strategies8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)10.1109/ICITST.2013.6750213(313-320)Online publication date: Dec-2013
      • (2009)Reduced complexity intrusion detection in sensor networks using genetic algorithmProceedings of the 2009 IEEE international conference on Communications10.5555/1817271.1817383(598-602)Online publication date: 14-Jun-2009

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media