Ad Hoc Networks. 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings

Research Article

Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture

Download
143 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-74439-1_7,
        author={Manpreet Kaur and Dale Lindskog and Pavol Zavarsky},
        title={Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture},
        proceedings={Ad Hoc Networks. 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28--29, 2017, Proceedings},
        proceedings_a={ADHOCNETS},
        year={2018},
        month={2},
        keywords={Mobile ad hoc networks Intrusion detection Intrusion response Clustering OLSR},
        doi={10.1007/978-3-319-74439-1_7}
    }
    
  • Manpreet Kaur
    Dale Lindskog
    Pavol Zavarsky
    Year: 2018
    Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-319-74439-1_7
Manpreet Kaur1,*, Dale Lindskog1,*, Pavol Zavarsky1,*
  • 1: Concordia University of Edmonton
*Contact email: mkaur2@student.concordia.ab.ca, dale.lindskog@concordia.ab.ca, pavol.zavarsky@concordia.ab.ca

Abstract

In this paper, our interest is intrusion response in mobile ad hoc networks (MANET). All intrusion response systems (IRS) presuppose an underlying intrusion detection system (IDS). We propose improvements to an existing dynamic and hierarchical IDS architecture for MANETs, proposed by Sterne et al. Our improvements are designed to enhance its ability to form an underlying base IDS for an imagined IRS. The enhancements are chosen to overcome the lack of resiliency in the selected architecture, by adding backup cluster heads and a backup root node. Additionally, we also propose revisions designed to avoid giving the root node too much authority over intrusion response, by distributing that power among cluster heads. The root node acts, rather, as an attack information database. The cluster heads, we propose, would make use of a MANET specific intrusion response algorithm proposed and described by Kaur et al.