Advanced Search
Volume 31 Issue 10
Dec.  2010
Turn off MathJax
Article Contents
Yi Ping, Liu Ning, Wu Yue. Intrusion Detection Based Timed Automata for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2009, 31(10): 2310-2315. doi: 10.3724/SP.J.1146.2008.00877
Citation: Yi Ping, Liu Ning, Wu Yue. Intrusion Detection Based Timed Automata for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2009, 31(10): 2310-2315. doi: 10.3724/SP.J.1146.2008.00877

Intrusion Detection Based Timed Automata for Ad hoc Networks

doi: 10.3724/SP.J.1146.2008.00877 cstr: 32379.14.SP.J.1146.2008.00877
  • Received Date: 2008-07-11
  • Rev Recd Date: 2009-07-16
  • Publish Date: 2009-10-19
  • In this paper, a distributed intrusion detection approach is proposed based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every nodes behaviour by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.
  • loading
  • 易平, 蒋嶷川, 钟亦平, 等. 移动Ad hoc 网络安全综述[J]. 电子学报, 2005, 33(5): 893-899.Yi P, Jiang Y C, and Zhong Y P, et al.. A survey of securityfor mobile ad hoc networks [J]. Acta Electronica Sinica, 2005,33(5): 893-899.[2]Zhang Yong-guang and Lee Wenke. Intrusion detection inwireless Ad-hoc networks[C]. Proceedings of The SixthInternational Conference on Mobile Computing andNetworking (MobiCom 2000), Boston, MA, August, 2000:275-283.[3]Zhang Yong-guang and Lee Wenke. Intrusion DetectionTechniques for Mobile Wireless Networks. Mobile Networksand Applications, 2003, 9(5): 545-556.[4]Kachirski O and Guha R. Intrusion detection using mobileagents in wireless ad hoc networks. IEEE Workshop onKnowledge Media Networking (KMN02), Kyoto, Japan,2002: 153-158.[5]Puttini R S.[J].Percher J M, and M L, et al.. A modulararchitecture for distributed IDS in MANET[C]. Proceedingsof the 2003 International Conference on ComputationalScience and Its Applications (ICCSA 2003), Springer Verlag,LNCS 2668, San Diego, USA.2003,:-[6]Huang Yi-an and Lee Wenke. A cooperative intrusiondetection system for ad hoc networks[C]. 2003 ACMWorkshop on Security of Ad Hoc and Sensor Networks(SASN '03), Fairfax, VA, USA, October 31, 2003: 135-147.[7]Sun B, Wu K, and Pooch U W. Routing anomaly detection inmobile ad hoc networks[C]. Proceedings of 12thInternational Conference on Computer Communications andNetworks (ICCCN 03), Dallas, Texas, October 2003: 25-31.[8]Albers P, Camp O, Percher J M, and Jouga B, et al.. Securityin ad hoc Networks: a general intrusion detection architectureenhancing trust based approaches. Proceedings of the FirstInternational Workshop on Wireless Information Systems(WIS-2002), Ciudad Real, Spain, Apr. 2002: 1-12.[9]Bhargava S and Agrawal D P. Security Enhancements inAODV Protocol for Wireless Ad Hoc Networks[C]. VehicularTechnology Conference, 2001: 2143-2147.[10]Wang Wei-chao, Lu Yi, and Bhargava B K. On vulnerabilityand protection of ad hoc on-demand distance vectorprotocol[C]. Proceedings of 10th IEEE InternationalConference on Telecommunication (ICT), Papeete, FrenchPolynesia, 2003: 375-382.[11]Subhadrabandhu D, Sarkar S, and Anjum F. A frameworkfor misuse detection in ad hoc networksPart I[J].IEEEJournal on Selected Areas in Communications.2006, 24(2):274-289[12]Chinyang Henry Tseng, Tao Song, PoornimaBalasubramanyam, Calvin Ko, and Karl Levitt. ASpecification-Based Intrusion Detection Model for OLSR[C].RAID 2005, LNCS 3858, 2006: 330-350.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3373) PDF downloads(829) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return