{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T04:05:13Z","timestamp":1648785913986},"reference-count":67,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,6,1]]},"abstract":"<jats:p> Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives. <\/jats:p>","DOI":"10.1155\/2013\/521497","type":"journal-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T17:29:56Z","timestamp":1372267796000},"page":"521497","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol"],"prefix":"10.1177","volume":"9","author":[{"given":"Mouhannad","family":"Alattar","sequence":"first","affiliation":[{"name":"UFC\/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montb\u00e9liard, France"}]},{"given":"Fran\u00e7oise","family":"Sailhan","sequence":"additional","affiliation":[{"name":"C\u00e9dric Laboratory, CNAM, 75003 Paris, France"}]},{"given":"Julien","family":"Bourgeois","sequence":"additional","affiliation":[{"name":"UFC\/FEMTO-ST Institute, UMR CNRS 6174, 25201 Montb\u00e9liard, France"}]}],"member":"179","published-online":{"date-parts":[[2013,6,25]]},"reference":[{"key":"B1-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.51"},{"key":"B2-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396943"},{"key":"B3-2013-521497","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2004.168.175"},{"key":"B4-2013-521497","first-page":"368","volume-title":"Proceedings of the Symposium on Applications and the Internet Workshops (SAINT '03)","author":"Brutch P."},{"key":"B5-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.005"},{"key":"B7-2013-521497","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"},{"key":"B8-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.015"},{"key":"B9-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0318-3"},{"key":"B10-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16444-6_13"},{"key":"B11-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"B14-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2007.72"},{"key":"B15-2013-521497","volume-title":"Proceedings of the International Conference on Machine Learning (ICML '95)","author":"Cohen W."},{"key":"B16-2013-521497","volume-title":"Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS '04)","author":"Sarafijanovic S."},{"key":"B17-2013-521497","volume-title":"Intrusion Detection in Mobile Ad Hoc Networks in Guide to Wireless Ad Hoc Networks","author":"Sen S.","year":"2009"},{"key":"B18-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861388"},{"key":"B19-2013-521497","first-page":"1548","volume-title":"Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Feeney L. M."},{"key":"B20-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.08.002"},{"key":"B21-2013-521497","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/374796"},{"key":"B22-2013-521497","volume-title":"Security Threats in Mobile Ad Hoc Networks, I. S. of Self-Organizing Networks","author":"Sen S.","year":"2010"},{"key":"B23-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.001"},{"key":"B25-2013-521497","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2213"},{"key":"B26-2013-521497","doi-asserted-by":"publisher","DOI":"10.1145\/1280940.1280955"},{"key":"B27-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.305"},{"key":"B28-2013-521497","volume-title":"Electronic Notes in Theoretical Computer Science","author":"Hegland L. N. A. M.","year":"2006"},{"issue":"6","key":"B29-2013-521497","first-page":"5049","volume":"3","author":"Kunwar P.","year":"2011","journal-title":"International Journal of Engineering Science"},{"key":"B30-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.130"},{"key":"B31-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"B32-2013-521497","volume-title":"Proceedings of the OLSR Interop Workshop","author":"Adjih C."},{"key":"B33-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2010.5764920"},{"issue":"9","key":"B34-2013-521497","first-page":"4063","volume":"2","author":"Jawandhiya P. M.","year":"2010","journal-title":"International Journal of Engineering Science and Technology"},{"key":"B35-2013-521497","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011474616255"},{"key":"B36-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"B37-2013-521497","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400109"},{"key":"B38-2013-521497","first-page":"39","volume-title":"Proceedings of the 44th Annual Simulation Symposium (ANSS '11)","author":"Zhang J."},{"key":"B39-2013-521497","volume-title":"Proceedings of the International Telemetering Conference (ITC '10)","author":"Broyles D."},{"key":"B40-2013-521497","volume-title":"Proceedings of the IFIP Med-Hoc-Net Workshop","author":"Haerri J."},{"key":"B41-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_17"},{"key":"B42-2013-521497","doi-asserted-by":"publisher","DOI":"10.1145\/1096166.1096174"},{"key":"B43-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.020"},{"key":"B44-2013-521497","volume-title":"Proceedings of the International Conference on Computational Science and Its Applications III","author":"Puttini R."},{"key":"B45-2013-521497","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364173"},{"key":"B46-2013-521497","doi-asserted-by":"publisher","DOI":"10.1002\/sec.108"},{"key":"B47-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2006.23"},{"issue":"3","key":"B48-2013-521497","first-page":"338","volume":"5","author":"Kurosawa S.","year":"2007","journal-title":"International Journal of Network Security"},{"key":"B49-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.036"},{"key":"B50-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.08.007"},{"key":"B51-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.04.003"},{"key":"B52-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3558-7_88"},{"key":"B53-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_7"},{"key":"B54-2013-521497","first-page":"16","volume-title":"Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04)","author":"Vigna G."},{"key":"B55-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17650-0_30"},{"key":"B56-2013-521497","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514289"},{"key":"B57-2013-521497","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"B58-2013-521497","volume-title":"Proceedings of The 12th International Conference on Computer Communications and Networks (ICCCN '03)","author":"Sun B."},{"key":"B59-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2007.350763"},{"key":"B60-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/11508380_121"},{"key":"B62-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"B63-2013-521497","first-page":"234","volume-title":"Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94)","volume":"24","author":"Perkins C."},{"key":"B64-2013-521497","volume-title":"Making Large-Scale Support Vector Machine Learning Practical","author":"Joachims T.","year":"1999"},{"key":"B65-2013-521497","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.3.27-34"},{"key":"B66-2013-521497","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0035-9"},{"key":"B67-2013-521497","first-page":"478","volume-title":"Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS '03)","author":"Huang Y."},{"key":"B68-2013-521497","volume-title":"C4. 5: Programs for Machine Learning","author":"Quinlan J.","year":"1993"},{"key":"B69-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2007.03.001"},{"key":"B70-2013-521497","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2005.1532054"},{"key":"B71-2013-521497","first-page":"125","volume-title":"Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks","author":"Tseng C. Y."},{"key":"B72-2013-521497","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.11.004"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/521497","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/521497","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/521497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:04:54Z","timestamp":1621191894000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/521497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,1]]},"references-count":67,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6,1]]}},"alternative-id":["10.1155\/2013\/521497"],"URL":"https:\/\/doi.org\/10.1155\/2013\/521497","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,1]]}}}