DocumentCode
817642
Title
A framework for misuse detection in ad hoc networks- part II
Author
Subhadrabandhu, Dhanant ; Sarkar, Saswati ; Anjum, Farooq
Author_Institution
Dept. of Electr. & Syst. Eng., Univ. of Pennsylvania, Philadelphia, PA, USA
Volume
24
Issue
2
fYear
2006
Firstpage
290
Lastpage
304
Abstract
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failure or compromise by intruders. Combining theories of stochastic coverage processes and approximation algorithms, we develop a framework to counter failure of detection modules, while minimizing the resource consumption. We show that the selection of the optimal set of nodes for executing the detection modules is an NP-hard problem. We present a distributed polynomial complexity selection algorithm that attains the best possible approximation ratio. We next consider a simple heuristic selection strategy that allows for seamless operation in time varying topologies. We obtain analytical expressions to quantify the tradeoffs between the resource consumption and detection rates attained by these algorithms. Using analysis and simulation, we identify the appropriate algorithms for different failure rates, resource limitation, and required detection rates.
Keywords
ad hoc networks; computational complexity; distributed algorithms; resource allocation; stochastic processes; telecommunication network management; telecommunication network topology; telecommunication security; NP-hard problem; ad hoc network; approximation algorithm; distributed selection algoritm; heuristic selection strategy; misuse detection; polynomial complexity; resource management; site security monitoring; stochastic coverage process; time varying topology; Ad hoc networks; Algorithm design and analysis; Approximation algorithms; Counting circuits; Failure analysis; Intrusion detection; NP-hard problem; Polynomials; Stochastic processes; Topology; Ad hoc networks; distributed algorithms; optimization; resource management; site security monitoring;
fLanguage
English
Journal_Title
Selected Areas in Communications, IEEE Journal on
Publisher
ieee
ISSN
0733-8716
Type
jour
DOI
10.1109/JSAC.2005.861388
Filename
1589109
Link To Document