Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks

被引:5
作者
Watkins, D [1 ]
Scott, C [1 ]
机构
[1] Morgan State Univ, Sch Engn, Dept Elect & Comp Engn, Baltimore, MD 21251 USA
来源
2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW | 2004年
关键词
D O I
10.1109/WCNC.2004.1311618
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Tactical mobile ad-hoc networks encompass a multitude of security vulnerabilities that are vastly different from their traditional wired countreparts. The wide-open distributed nature of the network environment leaves it susceptible to stealthy and coordinated attacks designed to access sensitive data, disrupt network communication, or consume resources. Intrusion detection algorithms and approaches are well-known. However, it is uncertain if these approaches are effective in a mobile ad-hoc environment where resources such as bandwidth are limited. To address this problem the Tactical Environment Assurance Laboratory, (TEALab) was established to provide an environment for characterizing tactical battlefield ad-hoc networks experiencing intrusive behaviors. This paper presents a methodology for evaluating the effectiveness of intrusion detection in a tactical ad-hoc environment. The methodology includes generating representative network event data with and without network attacks, running attacks with widely available intrusion detections systems and evaluating the behavior of the IDS in an ad-hoc environment.
引用
收藏
页码:622 / 627
页数:6
相关论文
共 9 条
[1]  
ATHANASADES N, 2003, P 1 IEEE INT WORKSH
[2]  
Beale J., 2003, SNORT 2 0 INTRUSION
[3]  
LIPPMAN RP, COMPUTER NETWORK, V34, P579
[4]  
MCCLURE S, 2001, HACKING EXPOSED
[5]  
NORTCUTT S, 2001, INTRUSION SIGNATURES
[6]  
RANUM M, 2003, EXPERIENCES BENCHMAR
[7]  
Stallings William, 1999, Cryptography and network security: principles and practice
[8]  
THOMAS S, 2001, 5 WORLD MULT SYST CY
[9]  
ZHANG YG, 2002, MOBIHOC 2002