John Felix Charles Joseph, A. Das, Boon-Chong Seet, Bu-Sung Lee
{"title":"manet中跨层与单层入侵检测方法","authors":"John Felix Charles Joseph, A. Das, Boon-Chong Seet, Bu-Sung Lee","doi":"10.1109/ICON.2007.4444085","DOIUrl":null,"url":null,"abstract":"Because of the inherent characteristics of MANET, such as distributed control and the lack of infrastructure, security threats exist almost in all layers of the network stack. This makes the design of intrusion detection systems for MANETS extremely hard. This work focuses primarily on studying the ability of detection of routing attacks in MANETS using various IDS schemes. We illustrate the inadequacy of conventional protocol-specific detection strategies using practical simulated experiments. Furthermore, we study the potential of a cross-layer IDS to overcome the problems associated with the design of MANET IDS. The strengths and weaknesses of single layer and cross layer approaches are examined using simulation-based experiments. The experimental results clearly show the supremacy of the cross-layer approach over single-layer (protocol-specific) approaches for MANETs.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"109 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs\",\"authors\":\"John Felix Charles Joseph, A. Das, Boon-Chong Seet, Bu-Sung Lee\",\"doi\":\"10.1109/ICON.2007.4444085\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Because of the inherent characteristics of MANET, such as distributed control and the lack of infrastructure, security threats exist almost in all layers of the network stack. This makes the design of intrusion detection systems for MANETS extremely hard. This work focuses primarily on studying the ability of detection of routing attacks in MANETS using various IDS schemes. We illustrate the inadequacy of conventional protocol-specific detection strategies using practical simulated experiments. Furthermore, we study the potential of a cross-layer IDS to overcome the problems associated with the design of MANET IDS. The strengths and weaknesses of single layer and cross layer approaches are examined using simulation-based experiments. The experimental results clearly show the supremacy of the cross-layer approach over single-layer (protocol-specific) approaches for MANETs.\",\"PeriodicalId\":131548,\"journal\":{\"name\":\"2007 15th IEEE International Conference on Networks\",\"volume\":\"109 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 15th IEEE International Conference on Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICON.2007.4444085\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 15th IEEE International Conference on Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2007.4444085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs
Because of the inherent characteristics of MANET, such as distributed control and the lack of infrastructure, security threats exist almost in all layers of the network stack. This makes the design of intrusion detection systems for MANETS extremely hard. This work focuses primarily on studying the ability of detection of routing attacks in MANETS using various IDS schemes. We illustrate the inadequacy of conventional protocol-specific detection strategies using practical simulated experiments. Furthermore, we study the potential of a cross-layer IDS to overcome the problems associated with the design of MANET IDS. The strengths and weaknesses of single layer and cross layer approaches are examined using simulation-based experiments. The experimental results clearly show the supremacy of the cross-layer approach over single-layer (protocol-specific) approaches for MANETs.