Skip to main content

Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

  • Conference paper
Ad Hoc Networks (ADHOCNETS 2009)

Abstract

Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bonnmotion: A mobility scenario generation and analysis tool, http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/BonnMotion/

  2. Ecj18: A java-based evolutionary computation research system, http://cs.gmu.edu/~eclab/projects/ecj/

  3. Ns-2: The network simulator, http://www.isi.edu/nsnam/ns

  4. Simplescalar, http://www.simplescalar.com/

  5. Abraham, A., Grosan, C.: Evolving intrusion detection systems. In: Genetic Systems Programming: Theory and Experiences, vol. 13, pp. 57–79. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Abraham, A., Grosan, C., Martiv-Vide, C.: Evolutionary design of intrusion detection programs. Int. Journal of Network Security 4, 328–339 (2007)

    Google Scholar 

  7. Huang, Y., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detection ad-hoc routing anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems, ICDCS (2003)

    Google Scholar 

  8. Anantvalee, T., Wu, J.: A Survey on Intrusion Detection in Mobile Ad Hoc Networks, ch. 7, pp. 159–180. Springer, Heidelberg (2007)

    Google Scholar 

  9. Anjum, F., Talpade, R.: Lipad: lightweight packet drop detection for ad hoc networks. In: 60th IEEE Vehicular Technology Conference Proceedings, pp. 1233–1237. IEEE, Los Alamitos (2004)

    Google Scholar 

  10. Brooks, D., Tiwari, V., Martonosi, M.: Wattch: A framework for architectural-level power analysis and optimizations. In: Proceedings of the 27th International Symposiyum on Computer Architecture, ISCA-27 (2000)

    Google Scholar 

  11. Denning, D.: An intrusion detection model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)

    Article  Google Scholar 

  12. Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  13. Kachirski, O., Guha, R.: Effective intrusion detection usign multiple sensors in wireless ad hoc networks. In: Proceedings of the 36th IEEE International Conference on System Sciences (2003)

    Google Scholar 

  14. Liu, Y., Chen, K., Liao, X., Zhang, W.: A genetic clustering method for intrusion detection. Pattern Recognition 37 (2004)

    Google Scholar 

  15. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of ACM Int. Conf. on Mobile Computing and Networking (MOBICOM), pp. 255–265 (2000)

    Google Scholar 

  16. Me, L.: Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. In: Proceedings of the International Symposium on Recent Advances in Intrusion Detection, RAID 1998 (1998)

    Google Scholar 

  17. Montana, D.J.: Strongly typed genetic programming. Evolutionary Computation 3, 199–230 (1995)

    Article  Google Scholar 

  18. Parker, J., Undercoffer, J., Pinkston, J., Joshi, A.: On intrusion detection and response for mobile ad hoc networks. In: 23rd IEEE Int. Performance Computing and Communications Conference Proceedings (2004)

    Google Scholar 

  19. Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: 2nd IEEE Workshop on Mobile Computer Systems and Applications Proceedings, pp. 90–100 (1999)

    Google Scholar 

  20. Ryan, C., Colline, J., O’Neill, M.: Grammatical evolution: Evolving programs for an arbitrary language. In: Banzhaf, W., Poli, R., Schoenauer, M., Fogarty, T.C. (eds.) EuroGP 1998. LNCS, vol. 1391, pp. 83–95. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Sen, S., Clark, J.A.: A grammatical evolution approach to intrusion detection on mobile ad hoc networks. In: Proc. of Second ACM Conference on Wireless Network Security, WiSec 2009 (2009)

    Google Scholar 

  22. Sen, S., Clark, J.A.: Intrusion Detection in Mobile Ad Hoc Networks, ch. 17, pp. 427–454. Springer, Heidelberg (2009)

    Google Scholar 

  23. Smith, A.: An examination of an intrusion detection architecture for wireless ad hoc networks. In: Proceedings of the 5th National Colloquium for Information System Security Education (2001)

    Google Scholar 

  24. Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C.-Y., Bowen, T.: A general cooperative intrusion detection architecture for manets. In: Proceedings of the 3rd International Workshop on Information Assurance, pp. 57–70 (2005)

    Google Scholar 

  25. Sun, B., Wu, K., Pooch, U.: Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks 2(3) (2003)

    Google Scholar 

  26. Tseng, C., Wang, S.-H., Lee, W., Ko, C., Lewitt, K.: DEMEM: Distributed evidence-driven message exchange intrusion detection model for MANET. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 249–271. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  27. Tseng, C.-Y., Balasubramayan, P., Ko, C., Limprasittiporn, R., Rowe, J., Lewitt, K.: A specification-based intrusion detection system for aodv. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks, SASN (2003)

    Google Scholar 

  28. Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 172–189. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  29. Vigna, G., Gwalani, S., Srinivasan, K., Belding-Royer, E.M., Kemmerer, R.A.: An intrusion detection tool for aodv-based ad hoc wireless networks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), pp. 16–27. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  30. Weise, T.: Genetic programming for sensor networks. Technical report (2006)

    Google Scholar 

  31. White, D.R., Clark, J., Jacob, J., Poulding, S.: Evolving software in the presence of resource constraints. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2008). Springer, Heidelberg (2008)

    Google Scholar 

  32. Wilson, D., Kaur, D.: Knowledge extraction from kdd’99 intrusion data using grammatical evolution. WSEAS Transactions on Information Science and Applications 4, 237–244 (2007)

    Google Scholar 

  33. Yi, P., Zhong, Y., Zhang, S.: A novel intrusion detection method for mobile ad hoc networks. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 1183–1192. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  34. Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. Wireless Networks Journal (ACM WINET) 2(5) (September 2003)

    Google Scholar 

  35. Zitzler, E., Laumanns, M., Thiele, L.: Spea2: Improving the strength pareto evolutionary algorithm. Technical Report 103, Swiss Federal Institute of Technology

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Şen, S., Clark, J.A., Tapiador, J.E. (2010). Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds) Ad Hoc Networks. ADHOCNETS 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11723-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11723-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11722-0

  • Online ISBN: 978-3-642-11723-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics