Advertisement

Cost-Effective IDS Operating Scheme in MANETs

  • Youngok Jeong
  • Younggoo Han
  • Hyunwoo Kim
  • Woochul Shim
  • Jaehong Kim
  • Sehun Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4298)

Abstract

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without any established infrastructure. MANETs are generally more vulnerable to security threats than fixed wired network due to its inherent characteristics such as absence of infrastructure, dynamically changing topologies. The selection of IDS operating node is one of critical issues because of energy limited feature of a MANET. In this paper, we propose a cost-effective IDS operating node selection scheme by solving cost minimization problem in a MANET. The results illustrate that our proposed algorithm can reduce the total cost while maintaining appropriate security level in a MANET.

Keywords

Mobile Node Intrusion Detection Intrusion Detection System Damage Cost Response Cost 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Patwardhan, A., Parker, J., Joshi, A.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. of the 23rd IEEE International Conf. on Pervasive Computing and Communications, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  2. 2.
    Alampalaym, S., Kumer, A., Srinivasan, S.: Mobile Ad hoc Network Security- a Taxonomy. In: Proc. of the 7th International Conf. on ICACT, vol. 2, pp. 839–844 (2005)Google Scholar
  3. 3.
    Helmer, G., Johnny, S., Wong, K., Honavar, V., Miller, L., Wang, Y.: Lightweight agents for intrusion detection. Journal of Systems and Software 67(Issue 2), 109–122 (2003)CrossRefGoogle Scholar
  4. 4.
    Stamouli, I., Argyroudis, P.G., Tewari, H.: Real-time Intrusion Detection for Ad hoc Networks. In: Proc. of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  5. 5.
    Venkatraman, L., Agrawal, D.: A Novel Authentication Scheme for Ad Hoc Networks. In: Proc. of Wireless Communications and Networking Conference, vol. 3, pp. 1268–1273 (2000)Google Scholar
  6. 6.
    Kim, H.W., Kim, D.W., Kim, S.H.: Lifetime-enhancing Selection of Monitoring Nodes for Intrusion Detection in Mobile Ad Hoc Networks. AEU-International Journal of Electronics and Communications 60(Issue 3), 248–250 (2006)CrossRefGoogle Scholar
  7. 7.
    Chang, J.H., Tassiulas, L.: Energy Conserving Routing in Wireless Ad-hoc Networks. In: Proc. INFOCOM, Tel Aviv, pp. 22–31 (2000)Google Scholar
  8. 8.
    Chlamtac, I., Conti, M., Jennifer, J., Liu, N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 1(Issue 1), 13–64 (2003)CrossRefGoogle Scholar
  9. 9.
    Jakobsson, M., Wang, X., Wetzel, S.: Stealth Attacks in Vehicular Technologies. In: Proc. of IEEE Vehicular Technology Conference, IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  10. 10.
    Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(Issue 1–2), 5–22 (2002)Google Scholar
  11. 11.
    Li, J.: Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. In: Proc. of the 2003 IEEE Workshop on Information Assurance United States Military Academy, vol. 2, pp. 53–59. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  12. 12.
    Sun, B., Wu, K., Pooch, U.W.: Towards Adaptive Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of Global Telecommunications Conference, vol. 6, pp. 3551–3555 (2004)Google Scholar
  13. 13.
    Northcutt, S.: Intrusion Detection: An Analyst’s Handbook. New Riders, Indianapolis (1999)Google Scholar
  14. 14.
    Bace, R.: Intrusion Detection. Macmillan Technical Publishing, Indianapolis (2000)Google Scholar
  15. 15.
    Kim, S.H.: Lecture Note on Nonlinear Programming. Non-linear programming course (2003)Google Scholar
  16. 16.
    Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security, Springer, Heidelberg (2006)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Youngok Jeong
    • 1
  • Younggoo Han
    • 1
  • Hyunwoo Kim
    • 2
  • Woochul Shim
    • 1
  • Jaehong Kim
    • 1
  • Sehun Kim
    • 1
  1. 1.Department of Industrial Engineering, KAIST, 373-1, Guseong-dong, Yuseong-gu, Daejeon, 305-701Korea
  2. 2.Network Service Management R&D Team, DACOM R&D Center, 34, Gajeong-dong, Yuseong-gu, Daejeon, 305-350Korea

Personalised recommendations