On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks

Intrusion detection in Wireless Mesh Networks WMN has recently emerged as an important research area. The diversity in WMN hardware and applications has generated extremely diverse network types, with diverse resource levels and system and threat models. Consequently, a variety of intrusion detection systems IDS have been proposed by the research community, each applicable to a specific type of WMN. Although the design and implementation of specific intrusion detection mechanisms have received considerable attention, little effort has been dedicated to the attack-and-fault tolerance of IDS themselves. In this paper we propose a taxonomy that categorizes state-of-the-art IDS solutions in WMN and we investigate the attack-and-fault tolerance of IDS in this taxonomy. We first survey a series of administrative mechanisms for attack-and-fault tolerant AFT IDS design. Then we propose modified designs for state-of-the-art IDS solutions that are AFT. Finally, through extensive simulations, we evaluate and compare AFT designed IDS with their original designs, with respect to the IDS performance and costs.

[1]  Hai Liu,et al.  Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks , 2009, Guide to Wireless Sensor Networks.

[2]  Ana R. Cavalli,et al.  A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks , 2013, Mobile Networks and Applications.

[3]  Saurabh Bagchi,et al.  Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.

[4]  David Hutchison,et al.  OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.

[5]  Jianying Zhou,et al.  Information and Communications Security , 2013, Lecture Notes in Computer Science.

[6]  Radu Stoleru,et al.  Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[7]  Geoffrey G. Xie,et al.  RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks , 2014, Comput. Secur..

[8]  Antonio Capone,et al.  A framework for detecting selfish misbehavior in wireless mesh community networks , 2009, Q2SWinet '09.

[9]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[10]  Mary K. Vernon,et al.  Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.

[11]  Radu Stoleru,et al.  On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..

[12]  Ala Altaweel,et al.  Traffic-and-resource-aware intrusion detection in wireless mesh networks , 2014, Ad Hoc Networks.

[13]  Qijun Gu,et al.  Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Peter Mell,et al.  A denial-of-service resistant intrusion detection architecture , 2000, Comput. Networks.

[15]  Devu Manikantan Shila,et al.  Load-aware Traffic Engineering for Mesh Networks , 2007, 2007 16th International Conference on Computer Communications and Networks.

[16]  Riccardo Bettati,et al.  Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.

[17]  Basem Shihada,et al.  Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks , 2011, ADHOC-NOW.

[18]  Vallipuram Muthukkumarasamy,et al.  Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[19]  Mieso K. Denko,et al.  A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks , 2011, Comput. Commun..

[20]  Matthias Hollick,et al.  DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks , 2013, HotWiSec '13.

[21]  Guofei Gu,et al.  PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks , 2013, ICICS.