A Cluster-Based Distributed Hierarchical IDS for

Many attempts were made to secure wireless ad hoc networks, but due to special ad-hoc nature, which is lack of a fixed infrastructure and central management, finding an optimal and comprehensive security solution is still a research challenge. Intrusion detection system is one of key techniques and best solution instead of intrusion protection behind protecting a network against intruders on mobile ad hoc network. In this paper, we introduce background knowledge of mobile ad hoc networks as well as intrusion detection systems and mobile agents. After investigating of existing intrusion detection based on mobile agents for wireless mobile ad hoc network; based on our best knowledge from previous researches, we design cluster-based distributed hierarchical intrusion detection system using mobile agents over Cluster-Based Routing Protocol (CBRP). The unique features of CBRP are the main factors of our success in achieving our goal to propose some enhancement based on the characteristics and measure the efficiency of intrusion detection system in term of bandwidth utilization and energy consumption.

[1]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[2]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[3]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[4]  A. Samsudin,et al.  Distributed hierarchical IDS for MANET over AODV+ , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[5]  Rahmat Budiarto,et al.  A New Approach CBRP Based Resource Information Management in MANETs , 2008 .

[6]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[7]  Hitesh Tewari,et al.  Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[8]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[9]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[10]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[11]  Alex Ali Hamidian,et al.  A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 , 2003 .

[12]  N. Nasser,et al.  Using mobile agents for intrusion detection in wireless ad hoc networks , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..