A Review on Intrusion Detection System in Mobile Ad-Hoc Network

被引:0
作者
Saxena, Aumreesh Ku. [1 ]
Sinha, Sitesh [1 ]
Shukla, Piyush [2 ]
机构
[1] AISECT, CSE Dept, Bhopal, India
[2] UIT RGPV, CSE Dept, Bhopal, India
来源
2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE) | 2017年
关键词
IDS; Mobile Agents; Security; Analysis; Mobile Ad-Hoc Network Agent; MANET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANET) is the most useful network in present and it is used in many application. In the MANET prevention concept is not sufficient from the security point of view, so the detection concept is added. Intrusion Detection System (IDS) is another concept to provide security in the network. Basically IDS is used to identify selfish and malevolent node in the network. Generally IDS concept is used in wired networks but incase of wireless network then it can no longer sufficient if we used it directly. Here we present the concept of MANET, IDS and we have discussed various existing IDS in MANET environment along with their pros and cons.
引用
收藏
页码:549 / 554
页数:6
相关论文
共 50 条
[21]   Enhancing Vehicular Ad-hoc Networks Security using Intrusion Detection System Techniques [J].
Houmer, Meriem ;
Hasnaoui, Moulay Lahcen .
4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19), 2019,
[22]   Research on Intrusion Detection Technique of Mobile Ad Hoc Network Security [J].
Sun, Huafeng .
MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 :2483-2488
[23]   Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network [J].
Arya, K. V. ;
Vashistha, Prerna ;
Gupta, Vaibhav .
DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 :675-684
[24]   A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Peter X. ;
Tang, Helen .
2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
[25]   A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET) [J].
Tahboush, Muhannad ;
Agoyi, Mary .
IEEE ACCESS, 2021, 9 :11872-11883
[26]   Probabilistic Monitoring in Intrusion Detection Module for Energy Efficiency in Mobile Ad-hoc Networks [J].
De Rango, Floriano ;
Lupia, Andrea .
UNMANNED SYSTEMS TECHNOLOGY XVIII, 2016, 9837
[27]   Distributed Court System for intrusion detection in mobile ad hoc networks [J].
Zhang, Da ;
Yeo, Chai Kiat .
COMPUTERS & SECURITY, 2011, 30 (08) :555-570
[28]   Vulnerabilities, Challenges and Threats in Securing Mobile Ad-hoc Network [J].
Raj, Nawneet ;
Bharti, Priyanka ;
Thakur, Sanjeev .
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, :771-775
[29]   A Distributed Self-Adaptive Intrusion Detection System for Mobile Ad-hoc Networks using Tamper Evident Mobile Agents [J].
Krishnan, Deepa .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :1203-1208
[30]   Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-hoc Networks [J].
Basomingera, Robert ;
Choi, Young-June .
33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, :31-36