On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol

Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To...

Full description

Saved in:
Bibliographic Details
Main Authors: Mouhannad Alattar, Françoise Sailhan, Julien Bourgeois
Format: Article
Language:English
Published: Wiley 2013-06-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/521497
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850236560530735104
author Mouhannad Alattar
Françoise Sailhan
Julien Bourgeois
author_facet Mouhannad Alattar
Françoise Sailhan
Julien Bourgeois
author_sort Mouhannad Alattar
collection DOAJ
description Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.
format Article
id doaj-art-1150b8e120934ee3b61a5cf810e7d37a
institution OA Journals
issn 1550-1477
language English
publishDate 2013-06-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-1150b8e120934ee3b61a5cf810e7d37a2025-08-20T02:01:56ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-06-01910.1155/2013/521497On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR ProtocolMouhannad Alattar0Françoise Sailhan1Julien Bourgeois2 UFC/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montbéliard, France Cédric Laboratory, CNAM, 75003 Paris, France UFC/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montbéliard, FranceMobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.https://doi.org/10.1155/2013/521497
spellingShingle Mouhannad Alattar
Françoise Sailhan
Julien Bourgeois
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
International Journal of Distributed Sensor Networks
title On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_full On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_fullStr On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_full_unstemmed On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_short On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
title_sort on lightweight intrusion detection modeling and detecting intrusions dedicated to olsr protocol
url https://doi.org/10.1155/2013/521497
work_keys_str_mv AT mouhannadalattar onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol
AT francoisesailhan onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol
AT julienbourgeois onlightweightintrusiondetectionmodelinganddetectingintrusionsdedicatedtoolsrprotocol