13 Hits in 7.0 sec

A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs [chapter]

Marko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige
2006 Lecture Notes in Computer Science  
SNMP API SNMP API IMF MANET MANET MANET MANET IMF = InterMediate Format RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICSComputer Networks Conclusions  ...  , INFORMATION PROCESSING AND ERGONOMICS Computer Networks July 2006 KIE • Monitoring & Configuration • Agent/Manager based concept • UDP based • Security in SNMPv3 • Management Information Base  ... 
doi:10.1007/11790754_10 fatcat:4bsta4ulmnazdalbl3x54mksry

Response Initiation in Distributed Intrusion Response Systems for Tactical MANETs

Gabriel Klein, Henning Rogge, Felix Schneider, Jens Toelle, Marko Jahnke, Stefan Karsch
2010 2010 European Conference on Computer Network Defense  
Response initiation messages are dispatched from a central location via a secure, reliable, and robust communication infrastructure based on SNMPv3.  ...  scenarios such as tactical MANETs.  ...  IMPLEMENTATION OF AN INTRUSION RESPONSE PROTOCOL FOR TACTICAL MANETS In this section, we present our implementation of an intrusion response initiation protocal along with a secure, robust, and reliable  ... 
doi:10.1109/ec2nd.2010.11 fatcat:5yipdlpsqjgcbja62zwgigo2py

Standardisation advancements in the area of routing for mobile ad-hoc networks

Tipu Arvind Ramrekha, Emmanouil Panaousis, Christos Politis
2011 Journal of Supercomputing  
In this paper, we provide a background on the possibility to use MANETs for enabling future pervasive internet and innovative ubiquitous services.  ...  The MANET Working Group (WG) of the Internet Engineering Task Force (IETF) is responsible for standardizing an appropriate Internet Protocol (IP) based routing protocol functionality for both static (mesh  ...  Last but not least, the MANET WG should consider drafts related to intrusion detection techniques designed for MANETs.  ... 
doi:10.1007/s11227-011-0705-2 fatcat:3p5cvff3bfcanalpd3t3kxt7tq

Systematic Literature Review over IDPS, Classification and Application in its Different Areas

Shehroz Afzal, Jamil Asim
Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and  ...  Anomaly-based Intrusion Detection Systems (AIDS).  ...  Acknowledgement Authors are thankful to the Editorial Team for their constructive support.  ... 
doi:10.52700/scir.v3i2.58 fatcat:xrczlxjg5ncclf2ftxyw3y5zce

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V. Krishnamurthy
2011 IEEE Communications Surveys and Tutorials  
In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the literature. We also describe various techniques proposed for detecting the presence of jammers.  ...  The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack.  ...  Wireless Ad Hoc Networks Intrusion Detection As mentioned before, mobile ad hoc networks (MANETs) are more susceptible to attacks due to the lack of infrastructure.  ... 
doi:10.1109/surv.2011.041110.00022 fatcat:3shw3wsgf5hzthokvk3cwjusfu

Using mobile agents for intrusion detection in wireless ad hoc networks

A. Hijazi, N. Nasser
Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005.  
This analysis shows a great feasibility and promising suitability for a mobile-agent-based solution to be adopted by the WAHNs intrusion detection systems.  ...  The paper also surveys, studies and compares the existing WAHNs mobile-agentsbased intrusion detection designs..  ...  [1, 2] Intrusion detection system IDS is a guard system that automatically detect intrusions and malicious activities within a host or a network, and then report that for subsequent response.  ... 
doi:10.1109/wocn.2005.1436049 fatcat:7f37vuur7jd73eoz3tumqwhpga

Queuing over Ever-changing Communication Scenarios in Tactical Networks

Roberto Rigolin Ferreira Lopes, Pooja Hanavadi Balaraju, Paulo Henrique Lopes Rettore, Peter Sevenich
2020 IEEE Transactions on Mobile Computing  
This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks.  ...  We discuss quantitative results showing the performance and limitations of our solutions for problems A, B and A|B. This work is licensed under a Creative Commons Attribution 4.0 License.  ...  ACKNOWLEDGMENTS This investigation was funded by BAAINBw (Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support) and WTD 81 (Bundeswehr Technical Center for Information  ... 
doi:10.1109/tmc.2020.3005737 fatcat:ecbmtrfg4rbuddtueqcua3jrue

CSEIT1833232 | Distributed Intrusion Detection System for Cognitive Radio Networks Based on Weighted Fair Queuing Algorithm

M Indhumathi, S Kavitha
In this paper, a method base on Dempster-Shafer's (DS) evidence theory to detect intrusion in CRNs is put forward, in which the detection data and credibility of different local IDS Agent is combined by  ...  In order to improve the performance of intrusion detection in CRNs, a distributed intrusion detection scheme has been proposed.  ...  An agent-based architecture is proposed for performing intrusion detection in a distributed environment.  ... 

A Survey on Spectrum Management for Unmanned Aerial Vehicles (UAVs)

Mohammed A. Jasim, Hazim Shakhatreh, Nazli Siasi, Ahmad Sawalmeh, Adel Aldalbahi, Ala Al-Fuqaha
2021 IEEE Access  
This is followed by a systematic structure for the management tools that employ deterministic, opportunistic, and competitive schemes.  ...  Existing surveys mostly focus on UAV applications, channel models, and security challenges, with a lack of studies on spectrum management in the context of UAV networks.  ...  Further, UAVs can monitor challenging areas that are difficult to detect with existing spectrum monitoring equipment such as an inter-mountainous base station, EIRP measurement, and canyon intrusion detection  ... 
doi:10.1109/access.2021.3138048 fatcat:2h5ls7ywo5g3bbz454gqatvkw4

OASIcs, Volume 17, KiVS'11, Complete Volume [article]

Norbert Luttenberger, Hagen Peters
In any case, parameters like responsiveness, rendering quality and network traffic must be studied intensively. Acknowledgements This work was part of a thesis [1].  ...  The presented idea for a virtual browser running "in the cloud" has the potential to provide a solution for these issues.  ...  It leads to very few false positives and false negatives and was shown to be very robust against packet losses. In total, it reliably detects fake link qualities in tactical scenarios.  ... 
doi:10.4230/oasics.kivs.2011 fatcat:tf3jwio36jd77njb3uje6snygm

Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment

Ulrich Flegel, Michael Meier, Technische Universität Dortmund, Technische Universität Dortmund
DIMVA 2004 was the workshop in the German-speaking area that was dedicated to the topics Intrusion Detection, Malicious Agents (Malware), and Vulnerability Assessment.  ...  The workshop program comprised new theoretical and practical approaches and results from research as well as experience reports on the principal topic Intrusion Detection and on the topics Honeypots, Vulnerabilities  ...  We also thank Klaus-Robert Müller and Stefan Harmeling for valuable suggestions and discussions.  ... 
doi:10.17877/de290r-8784 fatcat:qvo5cmghefgqpirbkvbfx2fouu

NETWORK VIRTUALIZATION ON THE WIRELESS EDGE Network virtualization on the wireless edge

Gautam Bhanage, Gautam Dilip, Bhanage Dissertation, Yanyong Zhang
Supporting virtualized WiFi access point based networks allows for a convenient sharing of a physical access point across multiple ISPs or network operators.  ...  The proposed virtual basestation architecture is based on an external substrate which uses a layer-2 switched datapath, and an arbitrated control path to the WiMAX base station.  ...  selects a more robust modulation and coding scheme(MCS).  ... 

Information Technology Curricula 2017: Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology

Mihaela Sabin, Hala Alrumaih, John Impagliazzo, Barry Lunt, Ming Zhang, Brenda Byers, William Newhouse, Bill Paterson, Svetlana Peltsverger, Cara Tang, Gerrit Van Der Veer, Barbara Viola
2017 unpublished
Design several rules for a network-based intrusion detection system that will protect against specific known attacks. f.  ...  Make sense of the role and limitations of signature-based and behavioral-based anti-virus technology. d. Contrast host-based and network-based intrusion detection systems. e.  ...  To provide ease of comparison, all curricula implementations appear as a set of courses designed for a system in which a semester provides 15 weeks of lecture and laboratory including the equivalent of  ...