Cargando…

A Cross-Layer, Anomaly-Based IDS for WSN and MANET

Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especial...

Descripción completa

Detalles Bibliográficos
Autores principales: Amouri, Amar, D. Morgera, Salvatore, A. Bencherif, Mohamed, Manthena, Raju
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5855147/
https://www.ncbi.nlm.nih.gov/pubmed/29470446
http://dx.doi.org/10.3390/s18020651
_version_ 1783307040363380736
author Amouri, Amar
D. Morgera, Salvatore
A. Bencherif, Mohamed
Manthena, Raju
author_facet Amouri, Amar
D. Morgera, Salvatore
A. Bencherif, Mohamed
Manthena, Raju
author_sort Amouri, Amar
collection PubMed
description Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks.
format Online
Article
Text
id pubmed-5855147
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-58551472018-03-20 A Cross-Layer, Anomaly-Based IDS for WSN and MANET Amouri, Amar D. Morgera, Salvatore A. Bencherif, Mohamed Manthena, Raju Sensors (Basel) Article Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks. MDPI 2018-02-22 /pmc/articles/PMC5855147/ /pubmed/29470446 http://dx.doi.org/10.3390/s18020651 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Amouri, Amar
D. Morgera, Salvatore
A. Bencherif, Mohamed
Manthena, Raju
A Cross-Layer, Anomaly-Based IDS for WSN and MANET
title A Cross-Layer, Anomaly-Based IDS for WSN and MANET
title_full A Cross-Layer, Anomaly-Based IDS for WSN and MANET
title_fullStr A Cross-Layer, Anomaly-Based IDS for WSN and MANET
title_full_unstemmed A Cross-Layer, Anomaly-Based IDS for WSN and MANET
title_short A Cross-Layer, Anomaly-Based IDS for WSN and MANET
title_sort cross-layer, anomaly-based ids for wsn and manet
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5855147/
https://www.ncbi.nlm.nih.gov/pubmed/29470446
http://dx.doi.org/10.3390/s18020651
work_keys_str_mv AT amouriamar acrosslayeranomalybasedidsforwsnandmanet
AT dmorgerasalvatore acrosslayeranomalybasedidsforwsnandmanet
AT abencherifmohamed acrosslayeranomalybasedidsforwsnandmanet
AT manthenaraju acrosslayeranomalybasedidsforwsnandmanet
AT amouriamar crosslayeranomalybasedidsforwsnandmanet
AT dmorgerasalvatore crosslayeranomalybasedidsforwsnandmanet
AT abencherifmohamed crosslayeranomalybasedidsforwsnandmanet
AT manthenaraju crosslayeranomalybasedidsforwsnandmanet