원문정보
초록
영어
Networks are protected using many firewalls and encryption software’s. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for Intrusion Detection and Response Systems, for Ad hoc networks. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We propose an mIDS (Mobile Intrusion Detection System) suitable for multi-hop ad-hoc wireless networks, which detects nodes misbehavior, anomalies in packet forwarding, such as intermediate nodes dropping or delaying packets. mIDS does rely on overhearing packet transmissions of neighboring nodes. Simple rules are designed to identify the misbehavior nodes. A special node called a monitor node carries out the process of identifying the misbehavior node.
목차
1. Introduction
2. Challenges
3. mIDS Attack
3.1.1 Unfair use of the transmission channel (ATTACK1)
3.1.2. Anomalies in packet forwarding (ATTACK2)
4. Intrusion detection methods and related work.
4.1 Detection methods.
4.2. Detecting attack1
4.3 Detecting attack2.
4.4. Detecting attack2b
5. Monitor identification method.
5.1 Monitor Election Protocol
6. Reactions .
6.1. Responding to attack1
6.2 Responding to attack2.
7. Conclusion .
8. References
