{"title":"一种新的入侵检测系统架构","authors":"Da Zhang, C. Yeo","doi":"10.1109/CCNC.2010.5421824","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a novel Intrusion Detection System (IDS), Court-like Cluster-based IDS (CCIDS), to secure routing protocoh: in Mobile Ad Hoc Networks (MANETs). After the network is divided into one-hop clusters, each of these clusters performs similar functions as a court in real-life, such as accusation, investigation and defence. We show that court like IDS is effective in many aspects, especially the capability to prevent malicious alerts and reduce false positive rate. To further prove its effectiveness, we then apply CCIDS in securing the Optimized Link State Routing (OLSR) protocol to solve two most severe attacks--link spoofing and link deletion. Through extensive simulation, four performance parameters, namely, detection rate, false positive rate, detection delay, and communication overhead are evaluated.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Novel Architecture of Intrusion Detection System\",\"authors\":\"Da Zhang, C. Yeo\",\"doi\":\"10.1109/CCNC.2010.5421824\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a novel Intrusion Detection System (IDS), Court-like Cluster-based IDS (CCIDS), to secure routing protocoh: in Mobile Ad Hoc Networks (MANETs). After the network is divided into one-hop clusters, each of these clusters performs similar functions as a court in real-life, such as accusation, investigation and defence. We show that court like IDS is effective in many aspects, especially the capability to prevent malicious alerts and reduce false positive rate. To further prove its effectiveness, we then apply CCIDS in securing the Optimized Link State Routing (OLSR) protocol to solve two most severe attacks--link spoofing and link deletion. Through extensive simulation, four performance parameters, namely, detection rate, false positive rate, detection delay, and communication overhead are evaluated.\",\"PeriodicalId\":172400,\"journal\":{\"name\":\"2010 7th IEEE Consumer Communications and Networking Conference\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 7th IEEE Consumer Communications and Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCNC.2010.5421824\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 7th IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2010.5421824","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Architecture of Intrusion Detection System
In this paper, we propose a novel Intrusion Detection System (IDS), Court-like Cluster-based IDS (CCIDS), to secure routing protocoh: in Mobile Ad Hoc Networks (MANETs). After the network is divided into one-hop clusters, each of these clusters performs similar functions as a court in real-life, such as accusation, investigation and defence. We show that court like IDS is effective in many aspects, especially the capability to prevent malicious alerts and reduce false positive rate. To further prove its effectiveness, we then apply CCIDS in securing the Optimized Link State Routing (OLSR) protocol to solve two most severe attacks--link spoofing and link deletion. Through extensive simulation, four performance parameters, namely, detection rate, false positive rate, detection delay, and communication overhead are evaluated.