Title: On effective data aggregation techniques in host-based intrusion detection in MANET
Authors: Difan Zhang; Linqiang Ge; Wei Yu; Hanlin Zhang; Rommie L. Hardy; Robert J. Reschly
Addresses: Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' U.S. Army Research Laboratory, Adelphi, MD 20783, USA ' U.S. Army Research Laboratory, Adelphi, MD 20783, USA
Abstract: A Mobile Ad Hoc Network (MANET) has been used in both commercial and tactical applications and faces security risks. Conducting cyber-attack monitoring and detection in MANET is challenging owning to limited resources. To deal with this issue, in this paper we develop lossless and lossy aggregation techniques to reduce the resources (e.g., energy consumption and bandwidth use) for transmitting security information through MANET while preserving the desired detection accuracy for cyber security operation. Particularly, our novel compression-based data aggregation technique effectively removes the duplicated information and compresses the pivotal data. The event-based data aggregation consolidates the data with the same type of predefined events. We also develop lossy data aggregation technique, namely feature-based data aggregation, which defines a series of basic features. We conduct real-world experiments and simulations to evaluate the effectiveness of our proposed data aggregation techniques in terms of energy consumption and detection accuracy.
Keywords: data aggregation; host-based intrusion detection; MANETs; mobile ad hoc networks; mobile networks; network security; cyber attacks; cyber attack monitoring; energy consumption; detection accuracy.
International Journal of Security and Networks, 2013 Vol.8 No.4, pp.179 - 193
Published online: 08 Dec 2013 *
Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article