The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Muitas pesquisas recentes concentram-se no projeto de um Sistema de Detecção de Intrusão (IDS) para detectar os maus comportamentos do nó malicioso na MANET com natureza ad-hoc e de mobilidade. No entanto, sem mecanismos de resposta de IDS rápidos e apropriados que realizem serviços de gestão de acompanhamento, mesmo o melhor IDS não pode atingir o objetivo principal desejado da resposta a incidentes. É necessária uma estratégia de contenção competente para limitar a extensão de um ataque no Ciclo de Vida de Resposta a Incidentes. Inspirados nos mecanismos das células T do sistema imunológico humano, propomos um protocolo de resposta MANET IDS eficiente (T-SecAODV) que pode disseminar com rapidez e precisão alertas de ataques de nós maliciosos para outros nós, de modo a modificar suas tabelas de roteamento AODV para isolar os nós maliciosos. As simulações são conduzidas pelo simulador de rede (Qualnet), e os resultados do experimento indicam que o T-SecAODV é capaz de espalhar alertas de forma constante, ao mesmo tempo em que reduz significativamente os rumores falsos sob múltiplos ataques simultâneos de nós maliciosos.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Bo-Chao CHENG, Huan CHEN, Ryh-Yuh TSENG, "A Good IDS Response Protocol of MANET Containment Strategies" in IEICE TRANSACTIONS on Communications,
vol. E91-B, no. 11, pp. 3657-3666, November 2008, doi: 10.1093/ietcom/e91-b.11.3657.
Abstract: Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e91-b.11.3657/_p
Copiar
@ARTICLE{e91-b_11_3657,
author={Bo-Chao CHENG, Huan CHEN, Ryh-Yuh TSENG, },
journal={IEICE TRANSACTIONS on Communications},
title={A Good IDS Response Protocol of MANET Containment Strategies},
year={2008},
volume={E91-B},
number={11},
pages={3657-3666},
abstract={Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.},
keywords={},
doi={10.1093/ietcom/e91-b.11.3657},
ISSN={1745-1345},
month={November},}
Copiar
TY - JOUR
TI - A Good IDS Response Protocol of MANET Containment Strategies
T2 - IEICE TRANSACTIONS on Communications
SP - 3657
EP - 3666
AU - Bo-Chao CHENG
AU - Huan CHEN
AU - Ryh-Yuh TSENG
PY - 2008
DO - 10.1093/ietcom/e91-b.11.3657
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E91-B
IS - 11
JA - IEICE TRANSACTIONS on Communications
Y1 - November 2008
AB - Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.
ER -