Intrusion Detection Systems in MANET: A Review

被引:9
作者
Amiri, Ehsan [1 ]
Keshavarz, Hassan [2 ]
Heidari, Hossein [1 ]
Mohamadi, Esmaeil [3 ]
Moradzadeh, Hossein [1 ,4 ]
机构
[1] Islamic Azad Univ, Nourabad Mamasani Branch, Nourabad Mamasani, Iran
[2] Univ Teknol Malaysia, Management Technol Dept, MJIIT, Kuala Lumpur 54100, Malaysia
[3] Shiraz Univ, Dept Comp Engn, Tehran, Iran
[4] Asia Pacific Univ Technol & Innovat, Sch Engn & Technol, Kuala Lumpur, Malaysia
来源
2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH | 2014年 / 129卷
关键词
Intrusion detection; MANET; attacks;
D O I
10.1016/j.sbspro.2014.03.700
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Mobile Ad hoc Network consists of some nodes that are stand randomly in operational environment. Because nodes are without any predefined infrastructure and mobility then that are susceptible for intrusion and attack. Securing is an important field in this type of network. In this paper we aim to representing concept of intrusion detection and then survey some of major intrusion detection approach in MANET and aim to comparing in some important field such as: use methods, type of attacks addressed, overhead, and architecture. (C) 2014 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:453 / 459
页数:7
相关论文
共 15 条
[1]  
Abdelhaq M., 2011, INT J NEW COMPUTER A, V3, P1
[2]  
Amiri E., 2012, SURVEY NETWORK ACCES
[3]  
Barani F., 2012, ISC INT J INFORM SEC, V1, P4
[4]  
BLAZEVIC L, 2001, IEEE COMMUNICATIONS
[5]  
Clark J.A., 2008, INTRUSION DETECTION
[6]  
Dang N., 2012, INT J COMPUTER APPL, V1
[7]  
Douligeris Ch., 2007, PERV SERV IEEE INT C
[8]  
Li Y, 2004, PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, P21
[9]  
Lundin E., 2002, 0204 CHALM U TECHN D
[10]  
Mitrokotsa A., 2008, INTRUSION DETECTION, P256