Is Intrusion Detection a Critical Component
Autor: colynw37 • July 21, 2011 • Essay • 814 Words (4 Pages) • 1,580 Views
Abstract:
Is Intrusion detection a critical component for the security framework in wireless ad hoc networks? MANET’s have received an incredible amount of attention because of their self-configuration and self-maintenance capabilities. The inherent properties of such networks and the lack of infrastructure and the dynamic and decentralized nature make it difficult to design effective Intrusion Detection Systems (IDS) for such an environment. (Joseph, Das, Seet & Lee 2008) Wireless devices are used on a consistent basis in our personal and professional lives. Despite the rapid growth in technology advancement, security in wireless communication continues to be a challenge. This paper will identify some of those challenges as well as focus on updated IDS. There are a number of IDS such as Crosstec, Exaprotect and Scansafe that are currently being used. This paper will analyze some of these IDS’s and determine if they are effective or actually difficult as stated by Joseph, Das, Seet & Lee.
Introduction:
What is a MANET and IDS?
A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links. (Wikipedia) MANET’s offer unrestricted mobility without an underlying infrastructure. Since ad hoc networks do not have an infrastructure, critical tasks such as routing and maintenance must be managed by the individual nodes separately.
“A MANET consists of mobile platforms (e.g., a router with multiple
hosts and wireless communications devices)--herein simply referred to
as "nodes"--which are free to move about arbitrarily. The nodes may
be located in or on airplanes, ships, trucks, cars, perhaps even on
people or very small devices, and there may be multiple hosts per
router. A MANET is an autonomous system of mobile nodes. The system
may operate in isolation, or may have gateways to and interface with
a fixed network. In the latter operational mode, it is typically
envisioned to operate as a "stub" network connecting to a fixed
internetwork. Stub networks carry traffic originating at and/or
destined for internal nodes, but do not permit exogenous traffic to
"transit" through the stub network. ( Corson & Macker 1999)
According
...