Documente Academic
Documente Profesional
Documente Cultură
4/29/12
Contents at a glance..
Introduction Vulnerabilities in MANETs Characteristics of a good Intrusion Detection System Classification of IDSs Approaches taken for intrusion detection Pathrater-Watchdog Approach Anomaly Detection Approach Mobile Agents for intrusion detection References
4/29/12
Introduction
Intrusion detection is
any set of actions that attempt to compromise the integrity, condentiality or availability of a resource
4/29/12
Vulnerabilities in MANETs
Open, easily accessed medium. Attacks ranging from
of moving independently. Nodes without adequate physical protection are susceptible to getting captured and compromised. Mobile nodes and the infrastructure thus, must be prepared to operate in a mode that trusts no peer. decentralized. This lack of centralized authority means that the adversaries can exploit this vulnerability for new types of attacks designed to 4/29/12
Classification of IDSs
Intrusion detection can be broadly classified into three broad categories Anomaly detection Misuse detection Specification-based detection
4/29/12
algorithm (TIARA)
Distributed
Watchdog-Pathrater Approach
4/29/12
Reduction in network load as well as latency as they move analysis programs closer to the audit data Increase fault tolerance. Even if portions of an IDS get destroyed or separated due to network partitioning, the mobile agents can still continue to work. Mobile agents tend to be independent of platform
4/29/12
References
Bo Sun et al Intrusion Detection Techniques in
Mobile D Hoc and Wireless Sensor Networks IEEE Wireless Communications, 56-63, October 2007 Techniques for Mobile Wireless Networks Wireless Networks 9, 545556, 2003 hoc Networks IEEE Wireless Communications, 4860, February 2004
4/29/12
Thank you
4/29/12