On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol

Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To...

Full description

Bibliographic Details
Main Authors: Mouhannad Alattar, Françoise Sailhan, Julien Bourgeois
Format: Article
Language:English
Published: SAGE Publishing 2013-06-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/521497
id doaj-1150b8e120934ee3b61a5cf810e7d37a
record_format Article
spelling doaj-1150b8e120934ee3b61a5cf810e7d37a2020-11-25T03:42:55ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-06-01910.1155/2013/521497On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR ProtocolMouhannad Alattar0Françoise Sailhan1Julien Bourgeois2 UFC/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montbéliard, France Cédric Laboratory, CNAM, 75003 Paris, France UFC/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montbéliard, FranceMobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.https://doi.org/10.1155/2013/521497
collection DOAJ
language English
format Article
sources DOAJ
author Mouhannad Alattar
Françoise Sailhan
Julien Bourgeois
spellingShingle Mouhannad Alattar
Françoise Sailhan
Julien Bourgeois
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
International Journal of Distributed Sensor Networks
author_facet Mouhannad Alattar
Françoise Sailhan
Julien Bourgeois
author_sort Mouhannad Alattar
title On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_short On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_full On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_fullStr On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_full_unstemmed On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_sort on lightweight intrusion detection: modeling and detecting intrusions dedicated to olsr protocol
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2013-06-01
description Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.
url https://doi.org/10.1155/2013/521497
work_keys_str_mv AT mouhannadalattar onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol
AT francoisesailhan onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol
AT julienbourgeois onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol
_version_ 1724522690391310336