Agent-based Distributed Intrusion Detection Methodology for MANETs
نویسندگان
چکیده
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical agent-based distributed intrusion detection methodology for MANETs. A two-step intrusion detection procedure has been developed to effectively detect anomalies and identify attack types using distributed intrusion detection agents. The approach is efficient in dealing with large amount of system audit information with the growing network size. In addition, the distributed agent based implementation provides inherent flexibility and scalability. The performance of the approach has been evaluated via extensive simulations.
منابع مشابه
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملDistributed Intrusion Detection Models for Mobile Ad Hoc Networks Distributed Intrusion Detection Models for Mobile Ad Hoc Networks
A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...
متن کاملA Mobile Agent based Intrusion Detection System Architecture for Mobile Ad Hoc Networks
Applications of Mobile Ad Hoc Networks (MANETs) have become extensively popular over the years among the researchers. However, the dynamic nature of MANETs imposes a set of challenges to its efficient implementation in practice. One of such challenges represents intrusion detection and prevention procedures that are intended to provide secured performance of ad hoc applications. In this study, ...
متن کاملDistributed Metastasis : A Computer Network Penetration Methodology
Metastasis refers to the process by which an attacker propagates a computer penetration throughout a computer network. The traditional methodology for Internet computer penetration is sufficiently well understood to define behavior which may be indicative of an attack, e.g. for use within an Intrusion Detection System. A new model of computer penetration : distributed metastasis, increases the ...
متن کاملQAIDS: Quantitative and Agent based Intrusion Detection System
Intrusion Detection Systems (IDSs) for Mobile Ad hoc Networks (MANETs) are necessary when we deploy MANETs in reality. In this paper, we focus on the protection of MANET routing protocols. Therefore, we present a new intrusion detection architecture based on quantitative, agents, and clusters that is suitable for multi-hop mobile ad hoc networks. It detects nodes misbehavior and anomalies in pa...
متن کامل