2006
DOI: 10.1007/11679219_3
|View full text |Cite
|
Sign up to set email alerts
|

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Gil et al in [24] have used IEEE 802.11 protocol and the extensible authentication protocol (EAP) specifications as specification source to define the desired behaviour of wireless local area network. Song et al in [25] combine both informal protocol specification and other documents from dynamic registration and configuration protocol as specification source. The spanning tree protocol (STP) specification has been leveraged as specification source by Jieke et al in [26] to describe the expected behaviour for carrier Ethernet network infrastructure.…”
Section: A Specification Sourcementioning
confidence: 99%
See 2 more Smart Citations
“…Gil et al in [24] have used IEEE 802.11 protocol and the extensible authentication protocol (EAP) specifications as specification source to define the desired behaviour of wireless local area network. Song et al in [25] combine both informal protocol specification and other documents from dynamic registration and configuration protocol as specification source. The spanning tree protocol (STP) specification has been leveraged as specification source by Jieke et al in [26] to describe the expected behaviour for carrier Ethernet network infrastructure.…”
Section: A Specification Sourcementioning
confidence: 99%
“…1) Manual: Most of the specification extraction methods adopt a manual approach for the extraction of the correct system behaviour from the specification source [18], [27], [16], [12], [17], [24], [25], [26], [13], [14], [15], [35], [36], [33], [32], [31]. This method has been shown to be an expensive and very tedious process [27].…”
Section: B Specification Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…These engines monitor only the particular routing protocols, and thus, they are only capable of detecting attacks that target the routing mechanisms of MANETs. Song et al [4] have proposed a specificationbased engine that monitors the Dynamic Registration and Configuration Protocol (DRCP) [10] for attacks that alter configuration information in MANETs. Finally, Raya et al [12] have proposed a mechanism for detecting misbehaviors in wireless networks relying on the 802.11 MAC [11] protocol.…”
Section: Introductionmentioning
confidence: 99%
“…Over the years, researchers developed custom specification-based intrusion detection techniques to fit different infrastructures such as mobile ad hoc networks [93][94][95][96][97][98] and WLANs [99]. Furthermore, specification-based IDSs were developed for specific use cases both for network-based (e.g., VoIP technologies [100], carrier Ethernet [101]) and host-based security (e.g., kernel dynamic data structures [102], mobile operating systems [103]).…”
Section: Specification-based Intrusion Detectionmentioning
confidence: 99%