CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs

In ad hoc networks, the vulnerability of nodes to routing attacks is a serious concern. In this work we propose a cross-layer based routing attack detection system for ad hoc networks. Previous work that uses mostly audit trails collected from the routing protocol suffers from inadequacy of features to construct a reliable model for detecting anomalous routing behavior. On the other hand, use of linear detectors lead to very high false positives and false negatives because of the inherent non-linear nature of the feature space. In this work, we address these issues by collating features from multiple protocols at different layers and using a non-linear detector based on support vector machine (SVM). The consequent problem of computational expense of the detection process is addressed by a combination of novel data reduction techniques. Simulation results show that the performance of the proposed CRADS is far superior than conventional protocol-specific detection systems.

[1]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[2]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[3]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[4]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[5]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[6]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .

[7]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Sumita Mishra,et al.  A cross-layer based intrusion detection approach for wireless ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[10]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[11]  Yang Li,et al.  Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  M. Little,et al.  TEALab: a testbed for ad hoc networking security research , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[13]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[14]  Yang Li,et al.  MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[15]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.