메뉴 건너뛰기




Volumn 15, Issue 4, 2013, Pages 2027-2045

A survey of manet intrusion detection & prevention approaches for network layer attacks

Author keywords

Intrusion detection and prevention; Mobile ad hoc networks; Network layer attacks; Securing ad hoc networks

Indexed keywords

INTRUSION DETECTION AND PREVENTION; INTRUSION DETECTION SYSTEMS; MANET ROUTING PROTOCOLS; MOBILE ADHOC NETWORK (MANETS); NETWORK LAYER ATTACKS; POINT DETECTION ALGORITHM; PROTECTION MECHANISMS; WIRELESS NETWORKING TECHNOLOGY;

EID: 84888341461     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.030713.00201     Document Type: Article
Times cited : (193)

References (97)
  • 1
    • 84888337092 scopus 로고    scopus 로고
    • IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF
    • IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF website www.ietf.org/dyn/wg/charter/manet-charter.html
  • 2
    • 84888379418 scopus 로고    scopus 로고
    • IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF
    • IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF website http://datatracker.ietf.org/wg/autoconf/charter/
  • 7
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • July
    • H. Debar, M. Dacier and A.Wespi, "A Revised Taxonomy for Intrusion Detection Systems", Annals of Telecommunications, Vol.55, No.7, pp 361-378, July 2000.
    • (2000) Annals of Telecommunications , vol.55 , Issue.7 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 9
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • DOI 10.1109/MWC.2007.4396943
    • B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Communications Magazine, special issue on Security in Wireless Mobile Ad Hoc and Sensor Networks, Vol.14, No.5, pp. 56-63, Oct. 2007. (Pubitemid 350231654)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Xiao, Y.3    Guizani, S.4
  • 11
    • 84880119198 scopus 로고    scopus 로고
    • A comprehensive survey of anomaly based intrusion detection systems in MANETs
    • D. Kheyri and M. Karami, "A comprehensive survey of anomaly based intrusion detection systems in MANETs", Journal of Computer and Information Science, Vol. 5, No. 4, pp. 132-139, 2012.
    • (2012) Journal of Computer and Information Science , vol.5 , Issue.4 , pp. 132-139
    • Kheyri, D.1    Karami, M.2
  • 15
  • 20
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • B. Johnson and A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", Proc. Mobile Computing Journal, Vol.353, pp 153-181, 1996.
    • (1996) Proc. Mobile Computing Journal , vol.353 , pp. 153-181
    • Johnson, B.1    Maltz, A.2
  • 21
    • 35348879637 scopus 로고    scopus 로고
    • The sleep deprivation attack in sensor networks: Analysis and methods of defence
    • M. Pirrete and R. Brooks, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence", International Journal of Distributed Sensor Networks, Vol.2, No.3, pp 267-287, 2006.
    • (2006) International Journal of Distributed Sensor Networks , vol.2 , Issue.3 , pp. 267-287
    • Pirrete, M.1    Brooks, R.2
  • 23
    • 34548048170 scopus 로고    scopus 로고
    • Detecting blackhole attack on aodvbased mobile ad hoc networks by dynamic learning method
    • November
    • S. Kurosawa and A. Jamalipour, "Detecting Blackhole Attack on AODVbased Mobile Ad Hoc Networks by Dynamic Learning method", International Journal of Network Security, Vol.5, No.3, pp 338-345, November 2007.
    • (2007) International Journal of Network Security , vol.5 , Issue.3 , pp. 338-345
    • Kurosawa, S.1    Jamalipour, A.2
  • 25
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attack and defence in wireless ad hoc networks routing protocol
    • Y.Hu, A. Perrig and B. Johnson, "Rushing Attack and Defence in Wireless Ad Hoc Networks Routing Protocol", Proc. ACM Workshop on Wireless Security, pp. 30-40, 2003.
    • (2003) Proc. ACM Workshop on Wireless Security , pp. 30-40
    • Hu, Y.1    Perrig, A.2    Johnson, B.3
  • 31
    • 33144467802 scopus 로고    scopus 로고
    • Secure data communication in mobile ad hoc networks
    • DOI 10.1109/JSAC.2005.861392
    • P. Papadimitratos and Z.Haas, "Secure Data Communication in Mobile Ad Hoc Networks", IEEE Journal on Selected Areas in Communications, Vol.24, No.2, pp 343-356, Feb. 2006. (Pubitemid 43269754)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 343-356
    • Papadimitratos, P.1    Haas, Z.J.2
  • 33
    • 70449436623 scopus 로고    scopus 로고
    • Detection and accusation of packet forwarding misbehaviour in mobile ad hoc networks
    • June
    • O.F. Gonzalez-Duque, G. Ansa, M. Howarth and G. Pavlou, "Detection and Accusation of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks", Journal of Internet Engineering, Vol.2, No.8, pp 181-192, June 2008.
    • (2008) Journal of Internet Engineering , vol.2 , Issue.8 , pp. 181-192
    • Gonzalez-Duque, O.F.1    Ansa, G.2    Howarth, M.3    Pavlou, G.4
  • 35
    • 33144479525 scopus 로고    scopus 로고
    • SCAN: Self-organized network-layer security in mobile ad hoc networks
    • DOI 10.1109/JSAC.2005.861384
    • H. Yang, J. Shu, X. Meng, and S. Lu, "SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 261-273, 2006. (Pubitemid 43269748)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 261-273
    • Yang, H.1    Shu, J.2    Meng, X.3    Lu, S.4
  • 36
    • 78650656608 scopus 로고    scopus 로고
    • Detect ddos flooding attacks in mobile ad hoc networks
    • Y. Guo and S. Perreau, "Detect DDoS Flooding Attacks in Mobile Ad Hoc Networks," International Journal of Security and Networks, Vol. 5, No.4, pp. 259-269, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 259-269
    • Guo, Y.1    Perreau, S.2
  • 38
    • 79951648076 scopus 로고    scopus 로고
    • LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc networks
    • H. Hsu, S. Zhu, and A. R. Hurson, "LIP: a Lightweight Interlayer Protocol for Preventing Packet Injection Attacks in Mobile Ad Hoc Networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 202-215, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 39
    • 33846606375 scopus 로고    scopus 로고
    • Defense against injecting traffic attack in cooperative ad hoc networks
    • St. Louis, Missouri, USA, Dec.
    • W.Yu and K.Ray, "Defense Against Injecting Traffic Attack in Cooperative Ad Hoc Networks", Proc. IEEE GLOBECOM, St. Louis, Missouri, USA, Dec. 2005.
    • (2005) Proc. IEEE GLOBECOM
    • Yu, W.1    Ray, K.2
  • 46
    • 6344273537 scopus 로고    scopus 로고
    • Secure message transmission in mobile ad hoc networks
    • DOI 10.1016/S1570-8705(03)00018-0
    • P. Papadimitratos and Z.J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks", Elsevier Journal of Ad Hoc Networks, Vol.1, No.1, pp 193-209, 2003. (Pubitemid 40421402)
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 193-209
    • Papadimitratos, P.1    Haas, Z.J.2
  • 47
    • 33646840438 scopus 로고    scopus 로고
    • The secure routing protocol (srp) for ad hoc networks
    • December
    • P. Papadimitratos, Z.J. Haas and P. Samar, "The Secure Routing Protocol (SRP) for Ad Hoc Networks", IETF Internet Draft , December 2002, available at http://www.ietf.org/proceedings/56/I-D/draftpapadimitratos-secure- routing-protocol-00.txt.
    • (2002) IETF Internet Draft
    • Papadimitratos, P.1    Haas, Z.J.2    Samar, P.3
  • 52
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • DOI 10.1002/qre.392
    • N.Ye and Q.Chen, "An Anomaly Detection Technique based on a CHISQUARE Statistics for Detecting Intrusion into Information System", International Journal of Quality and Reliability Engineering International, Vol.17, No.6, pp 105-112, 2001. (Pubitemid 32443869)
    • (2001) Quality and Reliability Engineering International , vol.17 , Issue.2 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 58
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. Semantics: Competing approaches to dynamic network intrusion detection
    • DOI 10.1504/IJSN.2008.016199
    • W. Scheirer and M. Chuah, "Syntax vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection", International Journal of Security and Networks, Vol. 3, No. 1, pp. 24-35, 2008. (Pubitemid 351546019)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.C.2
  • 64
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
    • Y. Liu, C. Comaniciu and H. Man, "Modelling Misbehaviour in Ad Hoc Networks: a Game Theoretic Approach for Intrusion Detection", International Journal of Security and Networks, Vol. 1, Nos.3/4, pp. 243-254, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 65
    • 33947139090 scopus 로고    scopus 로고
    • Markov chain based anomaly detection for wireless ad-hoc distribution power communication networks
    • H.Jiang and H.Wang, "Markov Chain Based Anomaly Detection for Wireless Ad-Hoc Distribution Power Communication Networks", Proc. IEEE Power Engineering Conference, 2005.
    • (2005) Proc. IEEE Power Engineering Conference
    • Jiang, H.1    Wang, H.2
  • 68
    • 34250761381 scopus 로고    scopus 로고
    • Integration of mobility and intrusion detection for wireless ad hoc networks
    • DOI 10.1002/dac.853
    • B.Sun, K.Wu, Y.Xiao and R.Wang, "Integration of Mobility and Intrusion Detection Wireless Ad Hoc Networks", Journal of Communication Systems, Wiley International, Vol. 20, No. 6, pp. 695-721, 2007. (Pubitemid 46959707)
    • (2007) International Journal of Communication Systems , vol.20 , Issue.6 , pp. 695-721
    • Sun, B.1    Wu, K.2    Xiao, Y.3    Wang, R.4
  • 70
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Sep.
    • Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM Wireless Networks, Vol. 9, No. 5, pp. 545-56, Sep. 2003.
    • (2003) ACM Wireless Networks , vol.9 , Issue.5 , pp. 545-56
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 76
    • 84888386674 scopus 로고    scopus 로고
    • A neural network scheme for anomaly based intrusion detection systems in mobile ad hoc networks
    • S.Jabbehdari, S.H. Talari and N.Modiri, "A Neural Network Scheme for Anomaly Based Intrusion Detection Systems in Mobile Ad Hoc Networks", Journal of Computing, Vol. 4, No. 2, pp-61-66, 2012.
    • (2012) Journal of Computing , vol.4 , Issue.2 , pp. 61-66
    • Jabbehdari, S.1    Talari, S.H.2    Modiri, N.3
  • 77
    • 0029267472 scopus 로고
    • State transition analysis: A rule based intrusion detection approach
    • March
    • K.Ilgun, R.A.Kemmerer, and P.A.Porras, "State Transition Analysis: a Rule Based Intrusion Detection Approach", IEEE Transactions on Software Engineering, Vol.21, No.3, pp-181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 79
    • 33845889547 scopus 로고    scopus 로고
    • Detecting unauthorized and compromised nodes in mobile ad hoc networks
    • DOI 10.1016/j.adhoc.2005.11.005, PII S1570870505001113
    • N.Komninos, D. Vergados and C.Douligeris, "Detecting Unauthorized and Compromised Nodes in Mobile Ad Hoc Networks", Journal of Ad Hoc Networks, Elsevier, Vol. 5, No. 3, pp 289-298, April 2007. (Pubitemid 46027748)
    • (2007) Ad Hoc Networks , vol.5 , Issue.3 , pp. 289-298
    • Komninos, N.1    Vergados, D.2    Douligeris, C.3
  • 80
    • 4143141932 scopus 로고    scopus 로고
    • Signature based intrusion detection for wireless ad hoc networks: A comparative study of various routing protocols
    • Oct
    • F. Anjum, D. Subhadrabandhu and S. Sarkar, "Signature Based Intrusion Detection for Wireless Ad Hoc Networks: a Comparative Study of Various Routing Protocols", Proc. IEEE Vehicular Technology Conference (VTC), Oct 2003.
    • (2003) Proc. IEEE Vehicular Technology Conference (VTC)
    • Anjum, F.1    Subhadrabandhu, D.2    Sarkar, S.3
  • 83
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/ detection systems from high-level specifications
    • R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention/ Detection Systems from High-Level Specifications", Proc. Usenix Security Symposium, 1999.
    • (1999) Proc. Usenix Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 95
    • 44649095872 scopus 로고    scopus 로고
    • A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
    • V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris, "A Novel Framework for Mobile Attack Strategy Modelling and Vulnerability Analysis in Wireless Ad Hoc Networks," International Journal of Security and Networks, Vol. 1, Nos.3/4, pp. 255-265, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 255-265
    • Karyotis, V.1    Papavassiliou, S.2    Grammatikou, M.3    Maglaris, V.4
  • 96
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • DOI 10.1016/S1570-8705(03)00019-2
    • Y.Hu, B. Johnson and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", International Journal of Ad hoc Networks, Vol.1, pp 175-192, 2003. (Pubitemid 40421401)
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 97
    • 84879894593 scopus 로고    scopus 로고
    • Protection of MANETs from a range of attacks using an intrusion detection and prevention system
    • Springer, In Press, DOI 10.1007/s11235-011-9484-6, July
    • A.Nadeem and M.Howarth, "Protection of MANETs from a range of attacks using an intrusion detection and prevention system", Telecommunication Systems Journal, Springer, In Press, DOI 10.1007/s11235-011- 9484-6, July 2011.
    • (2011) Telecommunication Systems Journal
    • Nadeem, A.1    Howarth, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.