{"title":"Temporal Analysis of Routing Activity for Anomaly Detection in Ad hoc Networks","authors":"Haitao Liu, Rajiv Gupta","doi":"10.1109/MOBHOC.2006.278595","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc network (MANET) faces serious security threat due to lack of consideration of security in design and inherent weaknesses. Anomaly detection techniques as well as preventive measures are in urgent need to protect ad hoc network. We propose an innovative anomaly detection technique based on temporal analysis of routing activities. Our approach uses data mining techniques to discover the underlying patterns of routing behavior and detect anomaly by comparing routing activities with the patterns. We tested the approach with two common attacks targeted at routing protocols and the experiment results show it is effective to detect routing disruption","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MOBHOC.2006.278595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Mobile ad hoc network (MANET) faces serious security threat due to lack of consideration of security in design and inherent weaknesses. Anomaly detection techniques as well as preventive measures are in urgent need to protect ad hoc network. We propose an innovative anomaly detection technique based on temporal analysis of routing activities. Our approach uses data mining techniques to discover the underlying patterns of routing behavior and detect anomaly by comparing routing activities with the patterns. We tested the approach with two common attacks targeted at routing protocols and the experiment results show it is effective to detect routing disruption