Case-Based Agents for Packet-Level Intrusion Detection in Ad Hoc Networks

@inproceedings{Guha2002CaseBasedAF,
  title={Case-Based Agents for Packet-Level Intrusion Detection in Ad Hoc Networks},
  author={Ratul Guha and Oleg Kachirski and Sara Stoecklin and Erbil Yilmaz},
  year={2002}
}
In this paper we propose a distributed agent framework for an intrusion detection system aimed at ad hoc wireless networks. Wireless networks are particularly vulnerable to intrusion, as they operate in an open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple security agents, we analyze the entire ad hoc wireless network for intrusions and try to inhibit intrusion attempts. A case-based reasoning approach to our intrusion… CONTINUE READING

Figures from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 17 CITATIONS

ReasONets: a fuzzy-based approach for reasoning on network incidents

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Intrusion Detection in Mobile Ad Hoc Networks

  • Guide to Wireless Ad Hoc Networks
  • 2009
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An advanced grammatical evolution approach for intrusion detection on multicast routing in MANET

  • International Conference on Information Communication and Embedded Systems (ICICES2014)
  • 2014
VIEW 1 EXCERPT
CITES METHODS

Mobile Agents-Based Intrusion Detection System for Mobile Ad Hoc Networks

  • 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering
  • 2010
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 16 REFERENCES

A case-based approach to network intrusion detection

  • Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)
  • 2002
VIEW 4 EXCERPTS

Intrusion detection using mobile agents in wireless ad hoc networks

  • Proceedings. IEEE Workshop on Knowledge Media Networking
  • 2002
VIEW 5 EXCERPTS

A taxonomy for attacks on mobile agent

  • EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)
  • 2001

Extending the DARPA off-line intrusion detection evaluations

  • Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
  • 2001
VIEW 1 EXCERPT

Fuzzy cognitive maps for decision support in an intelligent intrusion detection system

  • Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569)
  • 2001

Mobile security agents for network traffic analysis

  • Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
  • 2001
VIEW 2 EXCERPTS

A novel authentication scheme for ad hoc networks

  • 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540)
  • 2000
VIEW 1 EXCERPT

Implementation of an intrusion detection system based on mobile agents

  • 2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems
  • 2000
VIEW 2 EXCERPTS

POM-a mobile agent security model against malicious hosts

  • Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region
  • 2000