The proposed IDS architecture imposes less
processing overhead than the stand-alone and
cooperative architectures, since it does not require a
comprehensive detection engine at each node.
Furthermore, the processing workload is uniformly
distributed among the network nodes, since the
RWDs are moved randomly. The communication
load imposed by the movement (i.e., migration
process) of RWDs consists of the volume of the
executable code of the detection engine, while the
remaining functionality is pre-installed on each
network node. Thus, during the migration of a RWD
only a small volume of data will be transmitted.
Moreover, the communication overhead from the
migration process on each link does not occur
constantly, as happens in both cooperative and
hierarchical architectures. The detection accuracy of
the proposed IDS is not negatively affected by
nodes’ mobility, since detection does not rely on
cooperation from other nodes or cluster members.
The proposed IDS does not create points of
failure, since detection responsibilities are not
concentrated to a specific node or a fixed set of
nodes. A possible attack against one or more RWDs
does not hinder the detection process in a network,
since other RWDs traverse it. Moreover, the
proposed IDS is not vulnerable to man-in-the-middle
and blackmails attacks, since RWDs do not
exchange audit data and the migration process of a
RWD is protected through the use of an encrypted
communication channel. Finally, since the detection
tasks of a node are not assigned to other nodes, the
proposed IDS does not enable malicious nodes to
accuse legitimate nodes for malicious behaviour.
In future work, the proposed IDS will be
evaluated through analytic and simulation studies
and compared with existing IDSs. More specifically,
the RW-based architecture will be evaluated using:
(a) the response time to attacks, (b) the monitoring
time of a node, and (c) the ratio of RWDs/nodes. By
examining the response time of a RWD to attacks,
we can assess the time period that nodes remain
without protection when an attack takes place, and
thus adjust the replication mechanism accordingly.
The monitoring time of nodes (depends on nodes
criticality/significance) exhibits the distribution of
workload between nodes and is closely related to the
detection accuracy, the ratio of false positives and
the consumption of resources. Examining the ratio
of RWD/nodes, we can assess the scalability of the
proposed architecture in cases that the number of
nodes increases or decreases. On the other hand, the
specifications of the proposed engine will be further
elaborated and enhanced to address the entire
protocols employed at the transport, network, and
data-link layers of MANETs. Moreover, the
proposed engine will be evaluated regarding: (a) the
provided detection accuracy, (b) the rate of false
positives, and (c) the capability of detecting various
attacks at multiple layers. Finally, we will evaluate
the robustness of the proposed IDS under a variety
of security attacks, and the level of security provided
by the network steganography.
5 CONCLUSIONS
MANETs are susceptible to a variety of attacks that
primarily target the protocols of the transport,
network, and data-link layers. Currently, a large
number of IDSs have been proposed that protect
MANETs; however, the majority of them presents
limitations and weaknesses, which mainly derive
from the fact that they are inherited from static or
mobile networks. This paper proposes a novel IDS
that attempts to addresses the limitations and
weaknesses of the existing IDSs. It includes a
random walk-based architecture and a multi-layer,
specification-based detection engine. The proposed
architecture imposes less processing and
communication overhead to the underlying network,
it distributes uniformly the processing workload
among the network nodes, and it is robust to
dynamic network changes. Moreover, it does not
create points of failure, and it is not vulnerable to
man-in-the-middle and blackmail attacks. On the
other hand, the proposed engine enables the
detection of both known and unknown attacks, and
alleviates the need for a signature database. Finally,
it is not prone to high rates of false alarms.
REFERENCES
Mishra, A., Nadkarni, K., Patcha, A., 2004. Intrusion
Detection in Wireless Ad Hoc Networks. IEEE
Wireless Communications, Vol. 11, Issue 1, pp. 48-60.
Djenouri, D., Khelladi, L., Badache, N., 2005. A Survey
of Security Issues in Mobile Ad Hoc Networks. IEEE
Communications Surveys, Vol. 7, No. 4.
Yang, H., Luo, H., Ye, F., Lu. S., Zhang, L., 2004.
Security in mobile ad hoc networks: challenges and
solutions. IEEE Wireless Communications Surveys,
Vol. 11, No 1, pp. 38–47.
Sen, S., Clark, J. A., 2009. Intrusion Detection in Mobile
Ad Hoc Networks. Guide to Wireless Ad Hoc
Networks, S. Misra, I. Woungang, S.C. Misra (Eds.),
Springer, p. 427-454.
A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
33