Abstract
In this paper, our interest is intrusion response in mobile ad hoc networks (MANET). All intrusion response systems (IRS) presuppose an underlying intrusion detection system (IDS). We propose improvements to an existing dynamic and hierarchical IDS architecture for MANETs, proposed by Sterne et al. Our improvements are designed to enhance its ability to form an underlying base IDS for an imagined IRS. The enhancements are chosen to overcome the lack of resiliency in the selected architecture, by adding backup cluster heads and a backup root node. Additionally, we also propose revisions designed to avoid giving the root node too much authority over intrusion response, by distributing that power among cluster heads. The root node acts, rather, as an attack information database. The cluster heads, we propose, would make use of a MANET specific intrusion response algorithm proposed and described by Kaur et al.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sterne, D., Balasubramanyam, P., Carman, D.: A general cooperative intrusion detection architecture for MANETs. In: Proceedings of the Third IEEE International Workshop on Information Assurance (2005)
Kaur, J., Lindskog, D., Zavarsky, P.: An algorithm to facilitate intrusion response in mobile ad hoc networks. In: Proceedings of the 9th International Conference on Security of Information and Networks (2016)
Gupta, P.: A literature survey of MANET. Int. Res. J. Eng. Technol. (IRJET) 03(02), 95–99 (2016)
Hicham, Z., Ahmed, T., Rachid, L., Noureddin, I.: Evaluating and comparison of intrusion in mobile ad hoc network. Int. J. Distrib. Parallel Syst. (IJDPS) 3(2), 243–259 (2012)
Anantvalee, T.: A survey on intrusion detection in mobile ad hoc network. In: Wireless/Mobile Network Security, pp. 170–196 (2006)
Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9(5), 545–556 (2003)
Alattar, M.: Security supervision of mobile ad hoc network: a lightweight, robust and reliable intrusion detection system, Université de Franche-Comté (2013)
Badie, A.M., Lindskog, D., Zavarsky, P.: Responding to intrusions in mobile ad hoc networks. In: World Congress on Internet Security (WorldCIS-2013), pp. 30–34 (2013)
Chadli, S., Emharraf, M., Saber, M., Ziyyat, A.: Combination of hierarchical and cooperative models of an IDS for MANETs. In: Tenth International Conference on Signal-Image Technology & Internet-Based Systems (2014)
Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). October 2003. http://www.ietf.org/rfc/rfc3626.txt. Accessed 26 June 2016
Ishaq, Z.: Secure MANET using two head cluster in hierarchical cooperative IDS. Int. J. Comput. Appl. (0975–8887), 57(3), 10–13 (2012)
Sahana, S., Saha, S., Das Gupta, S.: Weight based hierarchical clustering algorithm for mobile ad hoc networks. Procedia Eng. 38, 1084–1093 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kaur, M., Lindskog, D., Zavarsky, P. (2018). Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture. In: Zhou, Y., Kunz, T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 223. Springer, Cham. https://doi.org/10.1007/978-3-319-74439-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-74439-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74438-4
Online ISBN: 978-3-319-74439-1
eBook Packages: Computer ScienceComputer Science (R0)