Hybrid Intrusion Detection Framework for Ad hoc networks
In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchic...
Gespeichert in:
Veröffentlicht in: | International journal of information security and privacy 2016-10, Vol.10 (4), p.1-32 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 32 |
---|---|
container_issue | 4 |
container_start_page | 1 |
container_title | International journal of information security and privacy |
container_volume | 10 |
creator | Korba, Abdelaziz Amara Nafaa, Mehdi Ghanemi, Salim |
description | In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms. |
doi_str_mv | 10.4018/IJISP.2016100101 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_gale_infotracmisc_A759569900</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759569900</galeid><sourcerecordid>A759569900</sourcerecordid><originalsourceid>FETCH-LOGICAL-c468t-e8482be447e2e1cd2c6d2943a2566f021f45ab5e5e9e96b71dde1f585c80ea3</originalsourceid><addsrcrecordid>eNp1kUFPGzEQhVcVlQqUe48r9cIlYcZre-1jRBsIQmoluFuOPaamyTrYGyH-PRuCEoFAc5jR6HtPo3lV9QNhzAHV2exqdvN3zAAlAiDgl-oQdQMjlFIf7GYB36qjUu4BhBCcHVbq8mmeo69nXZ_XJaau_kU9uX4zTbNd0mPK_-uQcj3x9b_k6o76zap8r74Guyh08tqPq5vp79vzy9H1n4vZ-eR65LhU_YgUV2xOnLfECJ1nTnqmeWOZkDIAw8CFnQsSpEnLeYveEwahhFNAtjmuTreuq5we1lR6s4zF0WJhO0rrYlApjsB4iwP68x16n9a5G24zTDeoZdNqvafu7IJM7ELqs3UbUzNphRZSa4CBGn9ADeVpGV3qKMRh_0YAW4HLqZRMwaxyXNr8ZBDMJh_zko_Z5zNILraSeBf3p0ZvdlGYXRRmmj_zQdg_6Y3Te9CsfGieAZ9npIo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2931963799</pqid></control><display><type>article</type><title>Hybrid Intrusion Detection Framework for Ad hoc networks</title><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Korba, Abdelaziz Amara ; Nafaa, Mehdi ; Ghanemi, Salim</creator><creatorcontrib>Korba, Abdelaziz Amara ; Nafaa, Mehdi ; Ghanemi, Salim</creatorcontrib><description>In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.</description><identifier>ISSN: 1930-1650</identifier><identifier>EISSN: 1930-1669</identifier><identifier>DOI: 10.4018/IJISP.2016100101</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Ad hoc networks ; Anomalies ; Clusters ; Computer information security ; Damage prevention ; Detectors ; Intrusion ; Intrusion detection systems ; Nodes ; Security ; Security software ; Simulation ; Specifications</subject><ispartof>International journal of information security and privacy, 2016-10, Vol.10 (4), p.1-32</ispartof><rights>COPYRIGHT 2016 IGI Global</rights><rights>Copyright © 2016, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c468t-e8482be447e2e1cd2c6d2943a2566f021f45ab5e5e9e96b71dde1f585c80ea3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2931963799?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,778,782,21371,27907,27908,33727,33728,43788,64366,64368,64370,72220</link.rule.ids></links><search><creatorcontrib>Korba, Abdelaziz Amara</creatorcontrib><creatorcontrib>Nafaa, Mehdi</creatorcontrib><creatorcontrib>Ghanemi, Salim</creatorcontrib><title>Hybrid Intrusion Detection Framework for Ad hoc networks</title><title>International journal of information security and privacy</title><description>In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.</description><subject>Ad hoc networks</subject><subject>Anomalies</subject><subject>Clusters</subject><subject>Computer information security</subject><subject>Damage prevention</subject><subject>Detectors</subject><subject>Intrusion</subject><subject>Intrusion detection systems</subject><subject>Nodes</subject><subject>Security</subject><subject>Security software</subject><subject>Simulation</subject><subject>Specifications</subject><issn>1930-1650</issn><issn>1930-1669</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kUFPGzEQhVcVlQqUe48r9cIlYcZre-1jRBsIQmoluFuOPaamyTrYGyH-PRuCEoFAc5jR6HtPo3lV9QNhzAHV2exqdvN3zAAlAiDgl-oQdQMjlFIf7GYB36qjUu4BhBCcHVbq8mmeo69nXZ_XJaau_kU9uX4zTbNd0mPK_-uQcj3x9b_k6o76zap8r74Guyh08tqPq5vp79vzy9H1n4vZ-eR65LhU_YgUV2xOnLfECJ1nTnqmeWOZkDIAw8CFnQsSpEnLeYveEwahhFNAtjmuTreuq5we1lR6s4zF0WJhO0rrYlApjsB4iwP68x16n9a5G24zTDeoZdNqvafu7IJM7ELqs3UbUzNphRZSa4CBGn9ADeVpGV3qKMRh_0YAW4HLqZRMwaxyXNr8ZBDMJh_zko_Z5zNILraSeBf3p0ZvdlGYXRRmmj_zQdg_6Y3Te9CsfGieAZ9npIo</recordid><startdate>20161001</startdate><enddate>20161001</enddate><creator>Korba, Abdelaziz Amara</creator><creator>Nafaa, Mehdi</creator><creator>Ghanemi, Salim</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20161001</creationdate><title>Hybrid Intrusion Detection Framework for Ad hoc networks</title><author>Korba, Abdelaziz Amara ; Nafaa, Mehdi ; Ghanemi, Salim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c468t-e8482be447e2e1cd2c6d2943a2566f021f45ab5e5e9e96b71dde1f585c80ea3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Ad hoc networks</topic><topic>Anomalies</topic><topic>Clusters</topic><topic>Computer information security</topic><topic>Damage prevention</topic><topic>Detectors</topic><topic>Intrusion</topic><topic>Intrusion detection systems</topic><topic>Nodes</topic><topic>Security</topic><topic>Security software</topic><topic>Simulation</topic><topic>Specifications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Korba, Abdelaziz Amara</creatorcontrib><creatorcontrib>Nafaa, Mehdi</creatorcontrib><creatorcontrib>Ghanemi, Salim</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of information security and privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Korba, Abdelaziz Amara</au><au>Nafaa, Mehdi</au><au>Ghanemi, Salim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hybrid Intrusion Detection Framework for Ad hoc networks</atitle><jtitle>International journal of information security and privacy</jtitle><date>2016-10-01</date><risdate>2016</risdate><volume>10</volume><issue>4</issue><spage>1</spage><epage>32</epage><pages>1-32</pages><issn>1930-1650</issn><eissn>1930-1669</eissn><abstract>In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/IJISP.2016100101</doi><tpages>32</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1930-1650 |
ispartof | International journal of information security and privacy, 2016-10, Vol.10 (4), p.1-32 |
issn | 1930-1650 1930-1669 |
language | eng |
recordid | cdi_gale_infotracmisc_A759569900 |
source | ProQuest Central UK/Ireland; ProQuest Central |
subjects | Ad hoc networks Anomalies Clusters Computer information security Damage prevention Detectors Intrusion Intrusion detection systems Nodes Security Security software Simulation Specifications |
title | Hybrid Intrusion Detection Framework for Ad hoc networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T08%3A55%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hybrid%20Intrusion%20Detection%20Framework%20for%20Ad%20hoc%20networks&rft.jtitle=International%20journal%20of%20information%20security%20and%20privacy&rft.au=Korba,%20Abdelaziz%20Amara&rft.date=2016-10-01&rft.volume=10&rft.issue=4&rft.spage=1&rft.epage=32&rft.pages=1-32&rft.issn=1930-1650&rft.eissn=1930-1669&rft_id=info:doi/10.4018/IJISP.2016100101&rft_dat=%3Cgale_proqu%3EA759569900%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2931963799&rft_id=info:pmid/&rft_galeid=A759569900&rfr_iscdi=true |