F. Cuppens, N. Cuppens-Boulahia, S. Nuon, T. Ramard
{"title":"基于属性的入侵检测保护OLSR","authors":"F. Cuppens, N. Cuppens-Boulahia, S. Nuon, T. Ramard","doi":"10.1109/ICWMC.2007.72","DOIUrl":null,"url":null,"abstract":"In this paper, we examine security issues related to proactive routing protocols for mobile ad-hoc networks (MANETs). Specifically, we investigate security properties of the optimized link-state routing (OLSR) protocol, a proactive routing protocol for MANETs. We analyze the possible attacks against the integrity of the network routing infrastructure, and present techniques to counter some attacks. Our main approach is based on a formal model to describe normal and incorrect node behaviors. This model allows us to derive security properties. The algorithm checks if these security properties are violated. If they are, detection occurs to allow the normal node to find a path without incorrect node behavior. Our approach does not change the message format, so it is very easy to implement the corresponding algorithm. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Property Based Intrusion Detection to Secure OLSR\",\"authors\":\"F. Cuppens, N. Cuppens-Boulahia, S. Nuon, T. Ramard\",\"doi\":\"10.1109/ICWMC.2007.72\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we examine security issues related to proactive routing protocols for mobile ad-hoc networks (MANETs). Specifically, we investigate security properties of the optimized link-state routing (OLSR) protocol, a proactive routing protocol for MANETs. We analyze the possible attacks against the integrity of the network routing infrastructure, and present techniques to counter some attacks. Our main approach is based on a formal model to describe normal and incorrect node behaviors. This model allows us to derive security properties. The algorithm checks if these security properties are violated. If they are, detection occurs to allow the normal node to find a path without incorrect node behavior. Our approach does not change the message format, so it is very easy to implement the corresponding algorithm. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.\",\"PeriodicalId\":366935,\"journal\":{\"name\":\"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICWMC.2007.72\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWMC.2007.72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we examine security issues related to proactive routing protocols for mobile ad-hoc networks (MANETs). Specifically, we investigate security properties of the optimized link-state routing (OLSR) protocol, a proactive routing protocol for MANETs. We analyze the possible attacks against the integrity of the network routing infrastructure, and present techniques to counter some attacks. Our main approach is based on a formal model to describe normal and incorrect node behaviors. This model allows us to derive security properties. The algorithm checks if these security properties are violated. If they are, detection occurs to allow the normal node to find a path without incorrect node behavior. Our approach does not change the message format, so it is very easy to implement the corresponding algorithm. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.