• Limited Resources – There is typically far less
network bandwidth available in MANETs than
can be provided in traditional wired networks
and wireless local area networks.
• Dynamic Connectivity
- As a peer-to-peer
network that consists of a variable number of
nodes that may be highly mobile an effective
intrusion detection approach cannot rely on the
presence of any particular node at any particular
point in time.
1.2 Mobile Intrusion Detection
Requirements
To overcome the inherent challenges posed by the
detection of attacks in MANETs, an effective
approach must possess several characteristics
(Sterne):
• Enable the detection of a wide variety of
potential attacks. Particular attention should be
provided for distributed attacks that are
conducted across the network.
• Minimize consumption of network resources.
Limitations in network bandwidth and
processing power of individual nodes must be
conserved for the primary function of the
MANET. Security functions, including intrusion
detection, must operate within the limited
resources that remain after the primary functions
of the network have been satisfied.
• Provide autonomous detection. The approach
must not rely upon any external analysis engine
or controller. The variability in the connectivity
of individual nodes would eliminate reliable data
exchange with any external monitor or
centralized controllers/monitors.
• Utilize data from a variety of sources. Some
types of attacks, particularly distributed attacks,
may only be detected through the use of data
from multiple sensors. As a result, the approach
should have the ability to leverage data from
throughout the MANET.
1.3 Prior Research
With the increasing application of MANETs in a
variety of applications the need for effective
intrusion detection is in these network is growing.
Numerous research efforts have been conducted to
address the requirements for effective MANET
intrusion detection. However, there are a limited
number of seminal research efforts that have formed
the basis for most of the current research in the field.
Zhang, et al (Zhang, 2004) developed a model in
which each node is responsible for independently
conducting localized intrusion detection and with
sharing data with neighboring nodes to provide
collaborative detective on a broader level. The
intrusion detection agents on the nodes
communicate via a secure communication channel
with cooperative detection engines. The resulting
multi-layered integrated intrusion detection system
demonstrated a scalable approach that provided both
local and global detection.
Sterne, et al, (Sterne, 2005), proposed a
comprehensive architecture designed to address the
unique requirements of a MANET-based detection
approach. In their proposed model detection occurs
through the use of a hierarchy in the MANET
formed by nodes that serve as clusterheads. These
nodes coordinate the identification of potential
attacks between nodes at lower levels in the
hierarchy. The paper describes how the approach
could be used to detect specific forms of MANET
attacks.
A significant weakness among most current
approaches is the reliance on dedicated messages
that are disseminated throughout the network on a
continuous basis. While the data communicated
between the nodes provides valuable information for
intrusion detection, it also utilizes the limited
bandwidth available in a MANET. Further, the
reliance on dedicated detection nodes results in a
potential vulnerability to the entire process if those
nodes are dropped from the network topology.
2 APPROACH
The Distributed Self-organizing Intrusion Response
(DISIR) system attempts to overcome these inherent
limitations by leveraging the power and flexibility of
a modified Learning Vector Quantization (LVQ)
neural network. LVQ neural networks combine
self-organizing maps (SOM) with a supervised
competitive layer that provides pattern recognition
capabilities.
2.1 Neural Processing
The LVQ is a combination of a SOM for
classification and a competitive multilayer neural
network that uses the output of a SOM as input for
to the competitive layer pattern recognition. The
LVQ architecture (Figure 1) contains one hidden
ICAART 2010 - 2nd International Conference on Agents and Artificial Intelligence
230