Browse > Article

A Study on Distributed Cooperation Intrusion Detection Technique based on Region  

Yang, Hwan Seok (중부대학교/정보보호학과)
Yoo, Seung Jae (중부대학교/정보보호학과)
Publication Information
Abstract
MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.
Keywords
Mobile Ad-Hoc Network; Intrusion Detection System; Routing Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Patwardham, J. Parker, A. Joshi, A. Karygiannis, M. Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks," Third IEEE International Conference on Pervasive Computing and Communications, pp 191-199, 2005.
2 L. Buttyan, J. P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM Journal for Mobile Networks (MONET), pp.570-592, 2003.
3 Fogla, P. and Lee, W., "Evading network anomaly detection systems: formal reasoning and practical techniques. In Proc of. ACM Conference on Computer and Communications Security (CCS), pp.59-68, 2006.
4 A. Rajaram, S. Palaniswami, "Malicious node detection system for mobile ad hoc networks," IJCSIT International Journal of Computer Science and Information Technologies, pp.77-85, 2010.
5 D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C. Tseng, T. Bowen, K. Levitt, J. Rowe, "A general cooperative intrusion detection architecture for manets," Proceedings of the 3rd IEEE IWIA, pp. 57-70, 2005.
6 N. Nasser, Y. Chen, "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks," ICC '07. IEEE International Conference on Communications, pp.1154-1159, 2007.
7 P.M. Mafra, V. Moll, J.S. Fraga, A.O. Santin, "Octopus-IIDS: An anomaly based intelligent intrusion detection system," ISCC, Italy, pp.405-410, 2010.