AllFreePapers.com - All Free Papers and Essays for All Students
Search

Is Intrusion Detection a Critical Component

Autor:   •  July 21, 2011  •  Essay  •  814 Words (4 Pages)  •  1,496 Views

Page 1 of 4

Abstract:

Is Intrusion detection a critical component for the security framework in wireless ad hoc networks? MANET’s have received an incredible amount of attention because of their self-configuration and self-maintenance capabilities. The inherent properties of such networks and the lack of infrastructure and the dynamic and decentralized nature make it difficult to design effective Intrusion Detection Systems (IDS) for such an environment. (Joseph, Das, Seet & Lee 2008) Wireless devices are used on a consistent basis in our personal and professional lives. Despite the rapid growth in technology advancement, security in wireless communication continues to be a challenge. This paper will identify some of those challenges as well as focus on updated IDS. There are a number of IDS such as Crosstec, Exaprotect and Scansafe that are currently being used. This paper will analyze some of these IDS’s and determine if they are effective or actually difficult as stated by Joseph, Das, Seet & Lee.

Introduction:

What is a MANET and IDS?

A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links. (Wikipedia) MANET’s offer unrestricted mobility without an underlying infrastructure. Since ad hoc networks do not have an infrastructure, critical tasks such as routing and maintenance must be managed by the individual nodes separately.

“A MANET consists of mobile platforms (e.g., a router with multiple

hosts and wireless communications devices)--herein simply referred to

as "nodes"--which are free to move about arbitrarily. The nodes may

be located in or on airplanes, ships, trucks, cars, perhaps even on

people or very small devices, and there may be multiple hosts per

router. A MANET is an autonomous system of mobile nodes. The system

may operate in isolation, or may have gateways to and interface with

a fixed network. In the latter operational mode, it is typically

envisioned to operate as a "stub" network connecting to a fixed

internetwork. Stub networks carry traffic originating at and/or

destined for internal nodes, but do not permit exogenous traffic to

"transit" through the stub network. ( Corson & Macker 1999)

According

...

Download as:   txt (5 Kb)   pdf (104 Kb)   docx (12 Kb)  
Continue for 3 more pages »