DocumentCode
2334425
Title
Efficacy of misuse detection in ad hoc networks
Author
Subhadrabandhu, Dhanant ; Sarkar, Saswati ; Anjum, Farooq
Author_Institution
Dept. of Electr. & Syst. Eng., Pennsylvania Univ., PA, USA
fYear
2004
fDate
4-7 Oct. 2004
Firstpage
97
Lastpage
107
Abstract
We consider ad hoc networks with multiple, mobile colluding intruders. We investigate the placement of the intrusion detection modules for misuse intrusion detection. Our goal is to maximize the detection performance subject to limitation in the computational resources. We mathematically formulate different detection objectives, and show that computing the optimal solution is NP-hard in each case. Thereafter, we propose a family of algorithms that approximate the optimal solution, and prove that some of these algorithms have guaranteeable approximation ratios. The algorithms that have analytically guaranteeable performance require re-computation every time the topology changes due to mobility. We next modify the computation strategy so as to seamlessly adapt to topological changes due to mobility. Using simulation we evaluate these algorithms, and identify the appropriate algorithms for different detection performance and resource consumption tradeoffs.
Keywords
ad hoc networks; approximation theory; computational complexity; mobile radio; optimisation; telecommunication network topology; telecommunication security; NP-hard; ad hoc network; misuse intrusion detection; mobile colluding intruder; Algorithm design and analysis; Approximation algorithms; Authentication; Intelligent networks; Intrusion detection; Large-scale systems; Monitoring; National security; Performance analysis; Systems engineering and theory;
fLanguage
English
Publisher
ieee
Conference_Titel
Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference on
Print_ISBN
0-7803-8796-1
Type
conf
DOI
10.1109/SAHCN.2004.1381907
Filename
1381907
Link To Document