Abstract
Mobile Ad Hoc Networks are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders. Anomaly-based detection engines are a topic of ongoing interest in the research community, due to their advantage in detecting unknown attacks. However, this advantage is offset by a number of limitations such as high rates of false alarms, imposition of processing overhead, lack of adaptability under dynamic network conditions etc. This paper presents a comprehensive evaluation and comparison of the most recent literature in the area of anomaly detection for MANETs. The provided weaknesses and limitations, which are thoroughly examined in this paper, constitute open issues in the area of MANET security and will drive future research steps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Djenouri, D., Khelladi, L., Badache, N.: A Survey of Security Issues in Mobile Ad Hoc Networks. IEEE Communications Surveys 7(4) (Fourth Quarter 2005)
Xenakis, C., Panos, C., Stavrakakis, I.: A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security 30(1) (January 2011)
Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks. IEEE Transactions on Vehicular Technology 58(5), 2471–2481 (2009)
Duda, R., Hart, P., Stork, D.: Pattern Classification and Scene Analysis. Wiley, New York (1973)
Joseph, J.F.C., Lee, B.-S., Das, A., Seet, B.-C.: Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA. IEEE Transactions on Dependable and Secure Computing 8(2), 233–245 (2011)
Nello, C., John, S.-T.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge Univ. Press, Cambridge (2000)
Lauf, A., Peters, R.A., Robinson, W.H.: A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks. Elsevier Journal of Ad Hoc Networks 8(3), 253–266 (2010)
Kabiri, P., Aghaei, M.: Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks. International Journal of Network Security 12(2), 80–87 (2011)
Nadeem, A., Howarth, M.: Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In: International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany, pp. 926–930 (2009)
Lancaster, H.O.: The Chi-Squared Distribution. Wiley Publications in Statistics (1969)
Tseng., C.-Y., et al.: A specification-based intrusion detection system for AODV. In: Proc. Of ACM Workshop on Security of Ad Hoc and Sensor Networks (2003)
Tseng, C.H., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.N.: A specification-based intrusion detection model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 330–350. Springer, Heidelberg (2006)
Hassan, H., Mahmoud, M., El-Kassas, S.: Securing the AODV protocol using specification-based intrusion detection. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, Terromolinos, Spain (2006)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561 (July 2003)
Sun, B., Wu, K., Xiao, Y., Wang, R.: Integration of mobility and intrusion detection for wireless ad hoc networks. Wiley International Journal of Communication Systems 20(6), 695–721 (2007)
Sun, B., Osborne, L., Yang, X., Guizani, S.: Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks. IEEE Wireless Communications 14(5), 56–63 (2007)
Mishra, A., Nadkarni, K., Patcha, A.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications 11(1), 48–60 (2004)
Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: A Survey on Anomaly Detection Methods for Ad hoc Networks. Ubiquitous Computing and Communication Journal 2(3), 67–76 (2005)
Li, Y., Wei, J.: Guidelines on Selecting Intrusion Detection Methods in MANET. In: The 21st Annual Conference for Information Systems Educators (ISECON), Rhode Island, USA, November 4-7 (2004)
Sen, S., Clark, J.A.: Intrusion Detection in Mobile Ad Hoc Networks. In: Misra, S., Woungang, I., Misra, S.C. (eds.) Guide to Wireless Ad Hoc Networks. Springer, Heidelberg (2009)
Anantvalee, T., Wu, J.: A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security, ch. 7, pp. 170–196. Springer, Heidelberg (2006)
Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C.-Y., Bowen, T., Levitt, K., Rowe, J.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the Third IEEE International Workshop on Information Assurance, pp. 57–70 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Panos, C., Xenakis, C., Stavrakakis, I. (2011). An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2011. Lecture Notes in Computer Science, vol 6863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22890-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-22890-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22889-6
Online ISBN: 978-3-642-22890-2
eBook Packages: Computer ScienceComputer Science (R0)