Intrusion Detection and Response in Ad hoc Networks
Journal article, 2007
Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can act as an effective line of defense in ad hoc networks. In this paper, we present an intrusion detection engine based on neural networks and an authenticated intrusion response engine based on an innovative key agreement protocol. In particular, we exploit information visualization and machine learning techniques in order to achieve efficient intrusion detection and we propose an effective intrusion response engine that is based on secure communication principles in order to mitigate the impacts of possible attacks. The performance of the proposed model is evaluated under different traffic conditions and mobility patterns.
Key Agreement Protocols
Ad Hoc networks