Evaluation of wireless intrusion detections tools for mobile ad hoc networks - Evaluation, threat analysis and typical cases
Publish date: 2004-01-01
Report number: FOI-R--1374--SE
Pages: 39
Written in: English
Abstract
Intrusion detection systems for mobile ad hoc networks are still in their infancy. No products are available today. This report presents an evaluation of ten wireless intrusion detection tools with regard to their suitability for tactical mobile ad hoc networks. These tools were evaluated according to proposed and identified requirements for mobile ad hoc network intrusion detection systems. The tools are discussed with regard to their usefulness, applicability and problems. To illustrate the needed functionality of an intrusion detection tool, a tactical scenario is described. The scenario is an international mission by coalition forces from Canada, the Netherlands and Sweden. The coalition forces have established a mobile ad hoc network for communication, which is exposed to several types of IT-attacks. To further describe vulnerabilities in mobile ad hoc networks, the exploitable vulnerabilities of mobile ad hoc networks are compared with common tactical radio networks. Furthermore, vulnerabilities in wired and wireless networks are compared in order to demonstrate which threats the property of wireless gives rise to. In the report, a mobile ad hoc network is defined by describing typical properties and also gives examples of mobile ad hoc networks. Three typical cases are also described.