Framework for intrusion detection in IEEE 802.11 wireless mesh networks

Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been proposed for ad-hoc networks, however due to the different characteristics, such intrusion detection systems cannot perform well in wireless mesh networks environment. In this paper, we propose a new framework of intrusion detection systems exclusively for wireless mesh networks. This paper will serve as a baseline guide for investigating intrusion detection systems for large scale multi-hop wireless broadband networks.

[1]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[2]  Amira Hamdi Shabaan,et al.  Intrusion detection system in wireless ad-hoc networks based on mobile agent technology , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[3]  Sajal K. Das,et al.  Security Issues in Wireless Mesh Networks , 2008 .

[4]  Kok-Keong Loo,et al.  Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .

[5]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[6]  Stephen Northcutt,et al.  Network intrusion detection , 2003 .

[7]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[8]  Thomas M. Chen,et al.  Intrusion Detection in Wireless Mesh Networks , 2008 .

[9]  Wu Yue,et al.  Distributed intrusion detection for mobile ad hoc networks , 2008 .

[10]  L. Javier García-Villalba,et al.  A Modular Architecture for Distributed IDS in MANET , 2003, ICCSA.

[11]  Ernesto Jiménez Caballero Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .

[12]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[13]  Howard Shrobe,et al.  TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture , 2007 .

[14]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[15]  Joshua Wright,et al.  Detecting Wireless LAN MAC Address Spoofing , 2003 .

[16]  Shiyong Zhang,et al.  Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005 .

[17]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[18]  Marjan Kuchaki Rafsanjani,et al.  Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes , 2008 .

[19]  Ronald F. DeMara,et al.  CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions , 2005, Autonomous Agents and Multi-Agent Systems.

[20]  Abdul Azim Abdul Ghani,et al.  Security Improvement for Management Frames in IEEE 802.11 Wireless Networks , 2007 .