Skip to main content

An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6863))

Abstract

Mobile Ad Hoc Networks are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders. Anomaly-based detection engines are a topic of ongoing interest in the research community, due to their advantage in detecting unknown attacks. However, this advantage is offset by a number of limitations such as high rates of false alarms, imposition of processing overhead, lack of adaptability under dynamic network conditions etc. This paper presents a comprehensive evaluation and comparison of the most recent literature in the area of anomaly detection for MANETs. The provided weaknesses and limitations, which are thoroughly examined in this paper, constitute open issues in the area of MANET security and will drive future research steps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Djenouri, D., Khelladi, L., Badache, N.: A Survey of Security Issues in Mobile Ad Hoc Networks. IEEE Communications Surveys 7(4) (Fourth Quarter 2005)

    Google Scholar 

  2. Xenakis, C., Panos, C., Stavrakakis, I.: A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security 30(1) (January 2011)

    Google Scholar 

  3. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks. IEEE Transactions on Vehicular Technology 58(5), 2471–2481 (2009)

    Article  Google Scholar 

  4. Duda, R., Hart, P., Stork, D.: Pattern Classification and Scene Analysis. Wiley, New York (1973)

    MATH  Google Scholar 

  5. Joseph, J.F.C., Lee, B.-S., Das, A., Seet, B.-C.: Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA. IEEE Transactions on Dependable and Secure Computing 8(2), 233–245 (2011)

    Article  Google Scholar 

  6. Nello, C., John, S.-T.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge Univ. Press, Cambridge (2000)

    MATH  Google Scholar 

  7. Lauf, A., Peters, R.A., Robinson, W.H.: A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks. Elsevier Journal of Ad Hoc Networks 8(3), 253–266 (2010)

    Article  Google Scholar 

  8. Kabiri, P., Aghaei, M.: Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks. International Journal of Network Security 12(2), 80–87 (2011)

    Google Scholar 

  9. Nadeem, A., Howarth, M.: Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In: International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany, pp. 926–930 (2009)

    Google Scholar 

  10. Lancaster, H.O.: The Chi-Squared Distribution. Wiley Publications in Statistics (1969)

    Google Scholar 

  11. Tseng., C.-Y., et al.: A specification-based intrusion detection system for AODV. In: Proc. Of ACM Workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  12. Tseng, C.H., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.N.: A specification-based intrusion detection model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 330–350. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Hassan, H., Mahmoud, M., El-Kassas, S.: Securing the AODV protocol using specification-based intrusion detection. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, Terromolinos, Spain (2006)

    Google Scholar 

  14. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561 (July 2003)

    Google Scholar 

  15. Sun, B., Wu, K., Xiao, Y., Wang, R.: Integration of mobility and intrusion detection for wireless ad hoc networks. Wiley International Journal of Communication Systems 20(6), 695–721 (2007)

    Article  Google Scholar 

  16. Sun, B., Osborne, L., Yang, X., Guizani, S.: Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks. IEEE Wireless Communications 14(5), 56–63 (2007)

    Article  Google Scholar 

  17. Mishra, A., Nadkarni, K., Patcha, A.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications 11(1), 48–60 (2004)

    Article  Google Scholar 

  18. Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: A Survey on Anomaly Detection Methods for Ad hoc Networks. Ubiquitous Computing and Communication Journal 2(3), 67–76 (2005)

    Google Scholar 

  19. Li, Y., Wei, J.: Guidelines on Selecting Intrusion Detection Methods in MANET. In: The 21st Annual Conference for Information Systems Educators (ISECON), Rhode Island, USA, November 4-7 (2004)

    Google Scholar 

  20. Sen, S., Clark, J.A.: Intrusion Detection in Mobile Ad Hoc Networks. In: Misra, S., Woungang, I., Misra, S.C. (eds.) Guide to Wireless Ad Hoc Networks. Springer, Heidelberg (2009)

    Google Scholar 

  21. Anantvalee, T., Wu, J.: A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security, ch. 7, pp. 170–196. Springer, Heidelberg (2006)

    Google Scholar 

  22. Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C.-Y., Bowen, T., Levitt, K., Rowe, J.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the Third IEEE International Workshop on Information Assurance, pp. 57–70 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Panos, C., Xenakis, C., Stavrakakis, I. (2011). An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2011. Lecture Notes in Computer Science, vol 6863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22890-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22890-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22889-6

  • Online ISBN: 978-3-642-22890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics