On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2013-06-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2013/521497 |
id |
doaj-1150b8e120934ee3b61a5cf810e7d37a |
---|---|
record_format |
Article |
spelling |
doaj-1150b8e120934ee3b61a5cf810e7d37a2020-11-25T03:42:55ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-06-01910.1155/2013/521497On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR ProtocolMouhannad Alattar0Françoise Sailhan1Julien Bourgeois2 UFC/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montbéliard, France Cédric Laboratory, CNAM, 75003 Paris, France UFC/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montbéliard, FranceMobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.https://doi.org/10.1155/2013/521497 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mouhannad Alattar Françoise Sailhan Julien Bourgeois |
spellingShingle |
Mouhannad Alattar Françoise Sailhan Julien Bourgeois On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol International Journal of Distributed Sensor Networks |
author_facet |
Mouhannad Alattar Françoise Sailhan Julien Bourgeois |
author_sort |
Mouhannad Alattar |
title |
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol |
title_short |
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol |
title_full |
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol |
title_fullStr |
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol |
title_full_unstemmed |
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol |
title_sort |
on lightweight intrusion detection: modeling and detecting intrusions dedicated to olsr protocol |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2013-06-01 |
description |
Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives. |
url |
https://doi.org/10.1155/2013/521497 |
work_keys_str_mv |
AT mouhannadalattar onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol AT francoisesailhan onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol AT julienbourgeois onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol |
_version_ |
1724522690391310336 |