Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks

被引:39
作者
Fadlullah, Zubair Md. [1 ]
Nishiyama, Hiroki [2 ]
Kato, Nei [2 ]
Fouda, Mostafa M. [1 ,3 ]
机构
[1] Tohoku Univ, Sendai, Miyagi 980, Japan
[2] Tohoku Univ, GSIS, Sendai, Miyagi 980, Japan
[3] Benha Univ, Cairo, Egypt
来源
IEEE NETWORK | 2013年 / 27卷 / 03期
关键词
Cognitive radio;
D O I
10.1109/MNET.2013.6523809
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of the security threats against it. For the secondary users in the CRN to quickly detect whether they are being attacked, a simple yet effective IDS is then presented. Our proposal uses non-parametric cumulative sum (cusum) as the change point detection algorithm to discover the abnormal behavior due to attacks. Our proposed IDS adopts an anomaly detection approach and it profiles the CRN system parameters through a learning phase. So, our proposal is also able to detect new types of attacks. As an example, we present the case of detection of a jamming attack, which was not known to the IDS beforehand. The proposed IDS is evaluated through computer based simulations, and the simulation results clearly indicate the effectiveness of our proposal.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 10 条
[1]  
Cordeiro C., 2006, Journal of Communications, V1, P38, DOI 10.4304/jcm.1.1.38-47
[2]  
El-Hajj W, 2011, J INTERNET TECHNOL, V12, P181
[3]   DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis [J].
Fadlullah, Zubair M. ;
Taleb, Tarik ;
Vasilakos, Athanasios V. ;
Guizani, Mohsen ;
Kato, Nei .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (04) :1234-1247
[4]  
Ju KS, 2012, INT J SECUR APPL, V6, P149
[5]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[6]  
Kurosawa S., 2007, International Journal of Network Security, P338
[7]   Securing cognitive radio networks [J].
Leon, O. ;
Hernandez-Serrano, J. ;
Soriano, M. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (05) :633-652
[8]  
Serrano J. H., 2011, P WKSP WIR COOP NETW
[9]   Change-point monitoring for the detection of DoS attacks [J].
Wang, HN ;
Zhang, DL ;
Shin, KG .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (04) :193-208
[10]  
XU W, 2005, P ACM INT S MOB AD H