A Novel Intrusion Detection Method for Mobile Ad Hoc Networks

The mobile ad hoc networks are particularly vulnerable to intrusion, as its features of open medium, dynamic changing topology, cooperative routing algorithms. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features, because no matter how secure the mobile ad hoc networks, its is still possible the nodes are compromised and become malicious. In this paper, we propose a novel intrusion detection approach for mobile ad hoc networks by using finite state machine. We construct the finite state machine (FSM) by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes cooperatively monitor every node's behaviour by the FSM. Our approach can detect real-time attacks without signatures of intrusion or trained data. Finally, we evaluate the intrusion detection method through simulation experiments.

[1]  Bharat Bhargava,et al.  On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[2]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[3]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[4]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[5]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[6]  Marina L. Gavrilova,et al.  Computational Science and Its Applications — ICCSA 2003 , 2003 .

[7]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[8]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[10]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[11]  L. Javier García-Villalba,et al.  A Modular Architecture for Distributed IDS in MANET , 2003, ICCSA.

[12]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[13]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[14]  Udo W. Pooch,et al.  Routing anomaly detection in mobile ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[15]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[16]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[17]  Dharma P. Agrawal,et al.  Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).