DocumentCode :
2079912
Title :
A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets
Author :
Watkins, Damian ; Scott, Craig ; Randle, Darryn
Author_Institution :
Knowledge Manage. & Integration Center of Excellence, Morgan State Univ., Baltimore, MD
fYear :
2006
fDate :
19-20 June 2006
Firstpage :
253
Lastpage :
260
Abstract :
The objective of the attack recognition effort is to develop inference and correlation technologies that can detect complex multi-stage attacks in mobile adhoc networks (MANET) environments where the reliance on centralized mechanisms or fixed relationships is unattainable. This work is supported by the Army Research Laboratory (ARL) Collaborative Technology Alliance (CTA). Technical Area 4 encompasses tactical information protection involving attack recognition and event dissemination where attack recognition is the focus of this study. Previous work has shown the ability to recognize malicious activity using a variety of statistical or fuzzy inference techniques. This research focuses on the next course of action after an attack takes place. This paper reports on an ongoing research effort to add the capability of a network to recover from an attack. This capability is based on the use of modified algorithms traditionally found in graph theory by an intelligent agent based framework. The agent-based framework is a collection of cooperative agents capable of raw packet data collection, comparison of metadata to a knowledge base, and the production of a decision
Keywords :
ad hoc networks; graph theory; mobile computing; security of data; telecommunication security; Army Research Laboratory; Collaborative Technology Alliance; Technical Area 4; attack recognition; clique set algorithm; complex multistage attack detection; cooperative agents; correlation technologies; cut set algorithm; event dissemination; fuzzy inference techniques; graph algorithm; graph theory; inference technologies; intelligent agent-based framework; knowledge base; malicious activity recognition; metadata; mobile adhoc networks; network security; raw packet data collection; statistical inference techniques; tactical MANET failover; tactical MANET recovery; tactical information protection; Ad hoc networks; Bandwidth; Collaboration; Communication system security; Government; Graph theory; Intelligent agent; Knowledge management; Mobile ad hoc networks; Protection; Clique Set Algorithm; Cut Set Algorithm; Graph Theory; Intelligent Agents; Mobile Adhoc Networks.; Network Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006. SNPD 2006. Seventh ACIS International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
0-7695-2611-X
Type :
conf
DOI :
10.1109/SNPD-SAWN.2006.4
Filename :
1640701
Link To Document :
بازگشت