Intrusion Detection Techniques for Mobile Wireless Networks
Rent the article at a discountRent now
* Final gross prices may vary according to local VAT.Get Access
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
- J. Binkley, Authenticated ad hoc routing at the link layer for mobile systems, Technical Report 96-3, Portland State University, Computer Science (1996).
- A. Boukerche and M.S.M.A. Notare, Neural fraud detection in mobile phone operations, in: Proceedings of the IPDPS 2000 Workshop, Cancun, Mexico, May 1–5 (2000) pp. 636–644.
- J. Broch, D. Johnson and D. Maltz, The dynamic source routing protocol for mobile adhocnetworks, Internet Draft, draft-ietf-manetdsr-01.txt (December 1998).
- W.W. Cohen, Fast effective rule induction, in: Proceedings of the 12th International Conference on Machine Learning (Morgan Kaufmann, San Mateo, CA, 1995) pp. 115–123.
- T.M. Cover and J.A. Thomas, Elements of Information Theory (Wiley, New York, 1991).
- K. Fall and E. Varadhan, The ns Manual 2000 (formerly ns Notes and Documentation).
- S. Forrest, S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, A sense of self for Unix processes, in: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA (IEEE Computer Society Press, New York, 1996) pp. 120–128.
- R. Heady, G. Luger, A. Maccabe and M. Servilla, The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico (August 1990).
- K. Ilgun, R.A. Kemmerer and P.A. Porras, State transition analysis: A rule-based intrusion detection approach, IEEE Transactions on Software Engineering 21(3) (1995) 181–199.
- S. Jacobs and M.S. Corson, MANET authentication architecture, Internet Draft, draft-jacobs-imep-auth-arch-01.txt (February 1999) expired at 2000.
- S. Jacobs, S. Glass, T. Hiller and C. Perkins, Mobile IP authentication, authorization, and accounting requirements, Request for Comments 2977, Internet Engineering Task Force (October 2000).
- T. Joachims, Making Large-Scale SVM Learning Practical (MIT Press, Cambridge, MA, 1999) chapter 11.
- D. Johnson, Routing in ad hoc networks of mobile hosts, in: Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA (1994).
- D.B. Johnson and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in: Mobile Computing, eds. T. Imielinski and H. Korth (Kluwer Academic, Dordrecht, 1996) pp. 153–181.
- Y.-B. Ko and N.H. Vaidya, Location-aided routing (LAR) in mobile ad hoc networks, ACM/Baltzer Wireless Networks (WINET) 6(4) (2000), extended version of the MobiCom'98 paper.
- S. Kumar and E.H. Spafford, A software architecture to support misuse intrusion detection, in: Proceedings of the 18th National Information Security Conference (1995) pp. 194–204.
- W. Lee and S.J. Stolfo, Data mining approaches for intrusion detection, in: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX (January 1998).
- W. Lee, S J. Stolfo and K.W. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the 1999 IEEE Symposium on Security and Privacy (May 1999).
- T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes and T. Garvey, A real-time intrusion detection expert system (IDES) – final technical report, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA (February 1992).
- D.A. Maltz, J. Broch, J. Jetcheva and D.B. Johnson, The effects of ondemand behavior in routing protocols for multi-hop wireless ad hoc networks, IEEE Journal on Selected Areas in Communications 17(8) (1999) 1439–1453.
- T. Mitchell, Machine Learning (McGraw-Hill, New York, 1997).
- C. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in: ACM SIGCOMM' 94 Conference on Communications Architectures, Protocols and Applications (1994) pp. 234–244.
- C. Perkins and E. Royer, Ad-hoc on-demand distance vector routing, in: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (February 1999) pp. 90–100.
- M. Satyanarayanan, J.J. Kistler, L.B. Mummert, M.R. Ebling, P. Kumar and Q. Lu, Experiences with disconnected operation in a mobile environment, in: Proceedings of USENIX Symposium on Mobile and Location Independent Computing, Cambridge, MA (August 1993) pp. 11–28.
- B.R. Smith, S. Murthy and J.J. Garcia-Luna-Aceves, Securing distancevector routing protocols, in: Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA (February 1997) pp. 85–92.
- L. Venkatraman, Secured routing protocol for ad-hoc networks, Master's Thesis, University of Cincinnati, OH (March 2000).
- L. Zhou and Z.J. Haas, Securing ad hoc networks, IEEE Network 13(6) (1999) 24–30
- Intrusion Detection Techniques for Mobile Wireless Networks
Volume 9, Issue 5 , pp 545-556
- Cover Date
- Print ISSN
- Online ISSN
- Kluwer Academic Publishers
- Additional Links
- intrusion detection
- intrusion response
- cooperative detection
- anomaly detection
- mobile ad-hoc networks
- Industry Sectors