On intrusion detection and response for mobile ad hoc networks

dc.contributor.authorParker, James
dc.contributor.authorUndercoffer, Jeffrey
dc.contributor.authorPinkston, John
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2018-12-13T15:29:16Z
dc.date.available2018-12-13T15:29:16Z
dc.date.issued2004-04-16
dc.description23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assuranceen_US
dc.description.abstractWe present network intrusion detection mechanisms that rely upon packet snooping to detect aberrant behavior in mobile ad hoc networks. Our extensions, which are applicable to several mobile ad hoc routing protocols, offer two response mechanisms, passive -- to singularly determine if a node is intrusive and act to protect itself from attacks, or active -- to collaboratively determine if a node is intrusive and act to protect all of the nodes of an ad-hoc cluster. We have implemented our extensions using the GloMoSim simulator and detail their efficacy under a variety of operational conditions. Based upon our positive simulation results, we are currently implementing our extensions in laptop computers and PDA's and constructing a testbed that use IEEE 802.11 with mobile ad hoc extensions.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/1395172en_US
dc.format.extent6 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/M2833N30H
dc.identifier.citationJ. Parker , J. Undercoffer , J. Pinkston , A. Joshi , On Intrusion Detection in Mobile Ad Hoc Networks, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , DOI: 10.1109/PCCC.2004.1395172en_US
dc.identifier.uri10.1109/PCCC.2004.1395172
dc.identifier.urihttp://hdl.handle.net/11603/12248
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2004 IEEE
dc.subjectintrusion detectionen_US
dc.subjectmobile ad hoc networksen_US
dc.subjectpacket snoopingen_US
dc.subjectad hoc clusteren_US
dc.subjectrouting protocolsen_US
dc.subjecttelecommunication securityen_US
dc.subjectmobile radioen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleOn intrusion detection and response for mobile ad hoc networksen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
122.pd.pdf
Size:
228.7 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: