2006
DOI: 10.1007/11872153_16
|View full text |Cite
|
Sign up to set email alerts
|

On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments

Abstract: Abstract. Manet security has a lot of open issues. Due to its characteristics, this kind of network needs preventive and corrective protection. In this paper, we focus on corrective protection proposing an anomaly IDS model for Manet. The design and development of the IDS are considered in our 3 main stages: normal behavior construction, anomaly detection and model update. A parametrical mixture model is used for behavior modeling from reference data. The associated Bayesian classification leads to the detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…In anomaly detection, the goal is to find objects that differ from most other objects in a group (see related work in [38]- [48] and references therein). Anomalous objects, also known as outliers, usually lie far away from other data points in the feature space.…”
Section: B Anomaly Detection Enginementioning
confidence: 99%
“…In anomaly detection, the goal is to find objects that differ from most other objects in a group (see related work in [38]- [48] and references therein). Anomalous objects, also known as outliers, usually lie far away from other data points in the feature space.…”
Section: B Anomaly Detection Enginementioning
confidence: 99%
“…A local agent is responsible for broadcasting alerts in its zone. Moreover, a special gateway zone is defined that aggregates locally generated alerts and [28] Mobile Agent Signature DoS N Buchegger and Le Boudec [66] Reputation Signature Packet Dropping Huang and Lee [67] Hierarchical Anomaly Routing, DoS Kachirski and Guha [68] Hierarchical Anomaly Packet Dropping † Michiardi and Molva [23] Reputation Anomaly Node Selfishness Patcha and Park [69] Game Theory Signature DoS † Puttini et al [70] Statistical Detection Anomaly Routing Disruption N Rao and Kesidis [71] Statistical Detection Signature Routing Disruption N Shakshuki et al [72] Machine Learning Signature Routing Disruption N Sterne et al [73] Hierarchical Hybrid Packet Dropping, Node Capture † Sun et al [74] Hierarchical Anomaly Routing Disruption N Zhang and Lee [75] Mobile Agent Anomaly DoS N Zhang et al [18] Mobile Agent Anomaly Routing Misdirection, Packet Dropping N † Suited for IoT networks with some stations without energy limitations that can act as cluster heads.…”
Section: Manetsmentioning
confidence: 99%
“…The presented algorithm was tested against four kinds of network attacks Some other studies utilized data obtained from SNMP-MIB for the purpose of intrusion detection in wireless networks [23], [24]. In [23], authors proposed a multi agent based intrusion detection system to detect the intrusion locally in mobile wireless networks using information from SNMP-MIB data, also Puttini et al [24]. A Bayesian classification was used to detect anomalous in network traffic in Mobile Ad Hoc Networks (MANET) using SNMP-MIB variables.…”
Section: Related Workmentioning
confidence: 99%