Advertisement

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach

  • Shukor Abd Razak
  • Steven Furnell
  • Nathan Clarke
  • Phillip Brooke
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Abstract

Existing Intrusion Detection Systems (IDS) in Mobile Ad Hoc Network (MANET) environments suffer from many problems because of the inherent characteristics of the network. Limited audit data, along with the problems faced in achieving global detection and response mechanisms, creates challenges for establishing reliable IDS for MANETs. In this paper, several scenarios are investigated where a ‘friend’ concept has been applied to solve MANET problems. This same concept is applied to a new IDS framework, and discussion is presented into how it can help in minimizing the problems that are faced in existing IDS. The key advantages of this two-tier IDS framework are its ability to detect intrusion at an early stage of such behaviour in the network, and its capability to minimize the impact of colluding blackmail attackers in the systems.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Milgram, S.: The Small World Problem. In: Psychology Today, pp. 60–67 (May 1967)Google Scholar
  3. 3.
    Adamic, L.A.: The small world web. In: Abiteboul, S., Vercoustre, A.-M. (eds.) ECDL 1999. LNCS, vol. 1696, pp. 443–452. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  4. 4.
    Helmy, A.: Small Worlds in Wireless Networks. In: IEEE Communications Letters, vol. 7(10) (October 2003)Google Scholar
  5. 5.
    Capkun, S., Hubaux, J.-P., Buttyan, L.: Mobility Helps Security in Ad Hoc Networks. In: Proc. of MobiHoc 2003, Annapolis, Maryland, USA, June 2003, pp. 46–56 (2003)Google Scholar
  6. 6.
    Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-Hoc Networks. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 341–354. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Raghavan, B., Snoeren, A.C.: Priority Forwarding in Ad Hoc Networks with Self-Interested Parties. In: Workshop on Economics of Peer-to-Peer Systems, Berkeley, USA (May 2003)Google Scholar
  8. 8.
    Miranda, H., Rodrigues, L.: Friends and Foes: Preventing Selfishness in Open Mobile Ad Hoc Networks. In: Proc. of the First International Workshop on Mobile Distributed Computing (MDC 2003), USA (2003)Google Scholar
  9. 9.
    Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion Detection Techniques for Mobile Wireless Networks. Journal of Wireless Networks 9(5), 545–556 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Shukor Abd Razak
    • 1
  • Steven Furnell
    • 1
  • Nathan Clarke
    • 1
  • Phillip Brooke
    • 2
  1. 1.Network Research Group, School of Computing, Communications & ElectronicsUniversity of Plymouth, Email:info@network-research-group.orgPlymouthUnited Kingdom
  2. 2.School of ComputingUniversity of TeessideMiddlesbroughUnited Kingdom

Personalised recommendations