Reference Hub6
Hybrid Intrusion Detection Framework for Ad hoc networks

Hybrid Intrusion Detection Framework for Ad hoc networks

Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi
Copyright: © 2016 |Volume: 10 |Issue: 4 |Pages: 32
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466689718|DOI: 10.4018/IJISP.2016100101
Cite Article Cite Article

MLA

Korba, Abdelaziz Amara, et al. "Hybrid Intrusion Detection Framework for Ad hoc networks." IJISP vol.10, no.4 2016: pp.1-32. http://doi.org/10.4018/IJISP.2016100101

APA

Korba, A. A., Nafaa, M., & Ghanemi, S. (2016). Hybrid Intrusion Detection Framework for Ad hoc networks. International Journal of Information Security and Privacy (IJISP), 10(4), 1-32. http://doi.org/10.4018/IJISP.2016100101

Chicago

Korba, Abdelaziz Amara, Mehdi Nafaa, and Salim Ghanemi. "Hybrid Intrusion Detection Framework for Ad hoc networks," International Journal of Information Security and Privacy (IJISP) 10, no.4: 1-32. http://doi.org/10.4018/IJISP.2016100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.