CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS

被引:18
作者
Joseph, John Felix Charles [1 ]
Das, Amitabha [2 ]
Lee, Bu-Sung [1 ]
Seet, Boon-Chong [3 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Div Comp Commun, Ctr Multimedia & Networks CeMNet, Singapore, Singapore
[2] Infosys Technol Ltd, SETLabs, Convergence Lab, Bangalore, Karnataka, India
[3] Auckland Univ Technol, Dept Elect & Elect Engn, Auckland, New Zealand
关键词
Intrusion detection; Routing security; Ad hoc networks; Cross layer system; Adaptive intrusion detection; Statistical classification;
D O I
10.1016/j.comnet.2009.10.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Routing behavior in ad hoc networks is highly transient. Thus, dynamically adapting the routing attack detection system at real-time to new attacks and changing network conditions is critical in ad hoc networks. Conventional incremental learning methods are computationally expensive for resource-constrained nodes in ad hoc networks. In this paper, we propose CARRADS, a computationally efficient methodology for adapting the intrusion detection model at real-time. The adaptation process consists of two major stages. In the first stage, the main task is to identify occurrence of new patterns in the routing control traffic and prioritize them based on their information content. The second stage of adaptation is to incrementally update the detection model using the new patterns with minimum computational overhead. CARRADS uses SVM algorithm for its superior detection abilities. However, using some innovative techniques the computational overhead of incremental update is reduced by a factor of 20 to 30 times at the cost of a negligible decrease in detection accuracy. This makes CARRADS a viable approach for real-time IDS in ad hoc networks. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1126 / 1141
页数:16
相关论文
共 26 条
[21]  
*SCAL NETW INC, 2005, QUALN VERS 9
[22]  
SONG N, 2005, 19 IEEE INT PAR DIST
[23]  
SUN B, 2004, GLOB TEL C GLOBECOM
[24]   The theoretical analysis of FDA and applications [J].
Tao, Q ;
Wu, GW ;
Wang, J .
PATTERN RECOGNITION, 2006, 39 (06) :1199-1204
[25]   Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators [J].
Tseng, HC ;
Culpepper, BJ .
COMPUTERS & SECURITY, 2005, 24 (07) :561-570
[26]  
Vapnik V. N., 1998, Statistical learning theory, V1