Hybrid Intrusion Detection Framework for Ad hoc networks

In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of information security and privacy 2016-10, Vol.10 (4), p.1-32
Hauptverfasser: Korba, Abdelaziz Amara, Nafaa, Mehdi, Ghanemi, Salim
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 32
container_issue 4
container_start_page 1
container_title International journal of information security and privacy
container_volume 10
creator Korba, Abdelaziz Amara
Nafaa, Mehdi
Ghanemi, Salim
description In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.
doi_str_mv 10.4018/IJISP.2016100101
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_gale_infotracmisc_A759569900</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759569900</galeid><sourcerecordid>A759569900</sourcerecordid><originalsourceid>FETCH-LOGICAL-c468t-e8482be447e2e1cd2c6d2943a2566f021f45ab5e5e9e96b71dde1f585c80ea3</originalsourceid><addsrcrecordid>eNp1kUFPGzEQhVcVlQqUe48r9cIlYcZre-1jRBsIQmoluFuOPaamyTrYGyH-PRuCEoFAc5jR6HtPo3lV9QNhzAHV2exqdvN3zAAlAiDgl-oQdQMjlFIf7GYB36qjUu4BhBCcHVbq8mmeo69nXZ_XJaau_kU9uX4zTbNd0mPK_-uQcj3x9b_k6o76zap8r74Guyh08tqPq5vp79vzy9H1n4vZ-eR65LhU_YgUV2xOnLfECJ1nTnqmeWOZkDIAw8CFnQsSpEnLeYveEwahhFNAtjmuTreuq5we1lR6s4zF0WJhO0rrYlApjsB4iwP68x16n9a5G24zTDeoZdNqvafu7IJM7ELqs3UbUzNphRZSa4CBGn9ADeVpGV3qKMRh_0YAW4HLqZRMwaxyXNr8ZBDMJh_zko_Z5zNILraSeBf3p0ZvdlGYXRRmmj_zQdg_6Y3Te9CsfGieAZ9npIo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2931963799</pqid></control><display><type>article</type><title>Hybrid Intrusion Detection Framework for Ad hoc networks</title><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Korba, Abdelaziz Amara ; Nafaa, Mehdi ; Ghanemi, Salim</creator><creatorcontrib>Korba, Abdelaziz Amara ; Nafaa, Mehdi ; Ghanemi, Salim</creatorcontrib><description>In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.</description><identifier>ISSN: 1930-1650</identifier><identifier>EISSN: 1930-1669</identifier><identifier>DOI: 10.4018/IJISP.2016100101</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Ad hoc networks ; Anomalies ; Clusters ; Computer information security ; Damage prevention ; Detectors ; Intrusion ; Intrusion detection systems ; Nodes ; Security ; Security software ; Simulation ; Specifications</subject><ispartof>International journal of information security and privacy, 2016-10, Vol.10 (4), p.1-32</ispartof><rights>COPYRIGHT 2016 IGI Global</rights><rights>Copyright © 2016, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c468t-e8482be447e2e1cd2c6d2943a2566f021f45ab5e5e9e96b71dde1f585c80ea3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2931963799?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,778,782,21371,27907,27908,33727,33728,43788,64366,64368,64370,72220</link.rule.ids></links><search><creatorcontrib>Korba, Abdelaziz Amara</creatorcontrib><creatorcontrib>Nafaa, Mehdi</creatorcontrib><creatorcontrib>Ghanemi, Salim</creatorcontrib><title>Hybrid Intrusion Detection Framework for Ad hoc networks</title><title>International journal of information security and privacy</title><description>In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.</description><subject>Ad hoc networks</subject><subject>Anomalies</subject><subject>Clusters</subject><subject>Computer information security</subject><subject>Damage prevention</subject><subject>Detectors</subject><subject>Intrusion</subject><subject>Intrusion detection systems</subject><subject>Nodes</subject><subject>Security</subject><subject>Security software</subject><subject>Simulation</subject><subject>Specifications</subject><issn>1930-1650</issn><issn>1930-1669</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kUFPGzEQhVcVlQqUe48r9cIlYcZre-1jRBsIQmoluFuOPaamyTrYGyH-PRuCEoFAc5jR6HtPo3lV9QNhzAHV2exqdvN3zAAlAiDgl-oQdQMjlFIf7GYB36qjUu4BhBCcHVbq8mmeo69nXZ_XJaau_kU9uX4zTbNd0mPK_-uQcj3x9b_k6o76zap8r74Guyh08tqPq5vp79vzy9H1n4vZ-eR65LhU_YgUV2xOnLfECJ1nTnqmeWOZkDIAw8CFnQsSpEnLeYveEwahhFNAtjmuTreuq5we1lR6s4zF0WJhO0rrYlApjsB4iwP68x16n9a5G24zTDeoZdNqvafu7IJM7ELqs3UbUzNphRZSa4CBGn9ADeVpGV3qKMRh_0YAW4HLqZRMwaxyXNr8ZBDMJh_zko_Z5zNILraSeBf3p0ZvdlGYXRRmmj_zQdg_6Y3Te9CsfGieAZ9npIo</recordid><startdate>20161001</startdate><enddate>20161001</enddate><creator>Korba, Abdelaziz Amara</creator><creator>Nafaa, Mehdi</creator><creator>Ghanemi, Salim</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20161001</creationdate><title>Hybrid Intrusion Detection Framework for Ad hoc networks</title><author>Korba, Abdelaziz Amara ; Nafaa, Mehdi ; Ghanemi, Salim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c468t-e8482be447e2e1cd2c6d2943a2566f021f45ab5e5e9e96b71dde1f585c80ea3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Ad hoc networks</topic><topic>Anomalies</topic><topic>Clusters</topic><topic>Computer information security</topic><topic>Damage prevention</topic><topic>Detectors</topic><topic>Intrusion</topic><topic>Intrusion detection systems</topic><topic>Nodes</topic><topic>Security</topic><topic>Security software</topic><topic>Simulation</topic><topic>Specifications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Korba, Abdelaziz Amara</creatorcontrib><creatorcontrib>Nafaa, Mehdi</creatorcontrib><creatorcontrib>Ghanemi, Salim</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of information security and privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Korba, Abdelaziz Amara</au><au>Nafaa, Mehdi</au><au>Ghanemi, Salim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hybrid Intrusion Detection Framework for Ad hoc networks</atitle><jtitle>International journal of information security and privacy</jtitle><date>2016-10-01</date><risdate>2016</risdate><volume>10</volume><issue>4</issue><spage>1</spage><epage>32</epage><pages>1-32</pages><issn>1930-1650</issn><eissn>1930-1669</eissn><abstract>In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/IJISP.2016100101</doi><tpages>32</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1930-1650
ispartof International journal of information security and privacy, 2016-10, Vol.10 (4), p.1-32
issn 1930-1650
1930-1669
language eng
recordid cdi_gale_infotracmisc_A759569900
source ProQuest Central UK/Ireland; ProQuest Central
subjects Ad hoc networks
Anomalies
Clusters
Computer information security
Damage prevention
Detectors
Intrusion
Intrusion detection systems
Nodes
Security
Security software
Simulation
Specifications
title Hybrid Intrusion Detection Framework for Ad hoc networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T08%3A55%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hybrid%20Intrusion%20Detection%20Framework%20for%20Ad%20hoc%20networks&rft.jtitle=International%20journal%20of%20information%20security%20and%20privacy&rft.au=Korba,%20Abdelaziz%20Amara&rft.date=2016-10-01&rft.volume=10&rft.issue=4&rft.spage=1&rft.epage=32&rft.pages=1-32&rft.issn=1930-1650&rft.eissn=1930-1669&rft_id=info:doi/10.4018/IJISP.2016100101&rft_dat=%3Cgale_proqu%3EA759569900%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2931963799&rft_id=info:pmid/&rft_galeid=A759569900&rfr_iscdi=true