A Context Adaptive Intrusion Detection System for MANET

被引:8
作者
Cheng, Bo-Chao [1 ]
Tseng, Ryh-Yuh [2 ]
机构
[1] Natl Chung Cheng Univ, Dept Commun Engn, Chiayi 621, Taiwan
[2] WuFeng Univ Sci & Technol, Dept Informat Management, Chiayi 621, Taiwan
关键词
MANET; Network security; Intrusion Detection System; Context awareness; Lifetime;
D O I
10.1016/j.comcom.2010.06.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the ad hoc and mobile nature of a MANET, it is much more vulnerable to attacks than a wired network. As a result, there has been a significant research focusing on designing an Intrusion Detection System (IDS) for MANETs to detect anomalous behavior and misuse. However, each mobile node in a MANET typically has limited energy and thus it is not efficient to perform IDS functions within a node to detect every incoming packet. There is a need for an IDS to implement an intelligent control mechanism in order to monitor and recognize security breach attempts efficiently over a period of the expected network lifetime. By leveraging the Network Node Intrusion Detection (NNID) strategy, we developed a context adaptive IDS controller that advises an IDS to carry out intrusion detection while being prepared for a possible "cut through" if it is likely that the residual energy is not sufficient. By being embedded with the context adaptive IDS controller, the proposed Context Adaptive Intrusion Detection System (CAIDS) is able to adapt to the current node context (such as residual energy, security threats and traffic loading) for accommodating and inspecting new arriving packets. The performance is evaluated using a reward function that discovers an effective way to perform intrusion detection and delivers security benefits while meeting the energy budget. The numerical results show that CAIDS offers a good trade-off between lifetime performance and security. This study demonstrates empirically that the CAIDS model intelligently monitors and recognizes security breach attempts while adhering to the resource budget plan over the period of expected network lifetime. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:310 / 318
页数:9
相关论文
共 15 条
[1]  
Agah A, 2005, IEEE ICC, P3218
[2]  
BACE R, 2000, NIST SPECIAL PUBLICA
[3]  
BIELECKI T, 2000, IEEE T AUTOMATIC CON, V45, P597
[4]  
CHAKI R, 2007, CISIM, P179
[5]   LSTF: A new scheduling policy for complex real-time tasks in multiple processor systems [J].
Cheng, BC ;
Stoyenko, AD ;
Marlowe, TJ ;
Baruah, SK .
AUTOMATICA, 1997, 33 (05) :921-926
[6]   A Good IDS Response Protocol of MANET Containment Strategies [J].
Cheng, Bo-Chao ;
Chen, Huan ;
Tseng, Ryh-Yuh .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (11) :3657-3666
[7]  
HUANG, 2003, P 1 ACM WORKSH SEC A
[8]  
Inella P., 2001, EVOLUTION INTRUSION
[9]  
Kleinrock L., 1977, Computer Networks, V1, P155, DOI 10.1016/0376-5075(77)90002-2
[10]  
KODIALAM M, 2003, IEEE INFOCOM