DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS USING SELF-ORGANIZING TEMPORAL NEURAL NETWORKS

James Cannady

2010

Abstract

Mobile ad hoc networks continue to be a difficult environment for effective intrusion detection. In an effort to achieve reliable distributed attack detection in a resource-efficient manner a self-organizing neural network-based intrusion detection system was developed. The approach, Distributed Self-organizing Intrusion Response (DISIR), enables real-time detection in a decentralized manner that demonstrates a distributed analysis functionality which facilitates the detection of complex attacks against MANETs. The results of the evaluation of the approach and a discussion of additional areas of research is presented.

References

  1. Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C.., Balupari, R., Tseng, C.-Y., Bowen, T. (2005). “A general cooperative intrusion detection architecture for MANETs” Proceedings of the 3rD International Workshop on Information Assurance.
  2. Mäntysalo, J., Torkkola, K., and Kohonen, T. (1992). "LVQ-based speech recognition with highdimensional context vectors". In Proceedings of the International Conference on Spoken Language Processing, Edmonton, Alberta, Canada.
  3. Chang, K., and Lu, Y. (1994). "Feedback learning: a hybrid SOFM/LVQ approach for radar target classification". In Proceedings of the International Symposium on Artificial Neural Networks.
  4. Linde, Y. (1980, January). "An Algorithm For Vector Quantier Design", IEEE Transactions on Communications, vol. 28, No. 1.
  5. Cannady, J. (2009). “Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization”. Proceedings of the 1st International Workshop on Wireless and Mobile Networks Security.
  6. Voegtlin, T. (2002). “Recursive self-organizing maps”. Neural Networks, 15(8-9).
  7. Choe, Y. and Miikkulainen, R. (1997). “Self- organization and segmentation with laterally connected spiking neurons”. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI-97).
  8. Zhang, Y., Lee, W., and Huang, Y. (2003). “Intrusion detection techniques for mobile networks”. Wireless Networks, Volume 9, Issue 5.
Download


Paper Citation


in Harvard Style

Cannady J. (2010). DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS USING SELF-ORGANIZING TEMPORAL NEURAL NETWORKS . In Proceedings of the 2nd International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-674-021-4, pages 229-234. DOI: 10.5220/0002712802290234


in Bibtex Style

@conference{icaart10,
author={James Cannady},
title={DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS USING SELF-ORGANIZING TEMPORAL NEURAL NETWORKS},
booktitle={Proceedings of the 2nd International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2010},
pages={229-234},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002712802290234},
isbn={978-989-674-021-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS USING SELF-ORGANIZING TEMPORAL NEURAL NETWORKS
SN - 978-989-674-021-4
AU - Cannady J.
PY - 2010
SP - 229
EP - 234
DO - 10.5220/0002712802290234