Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach

@article{Hirnwal2012IntrusionDT,
  title={Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach},
  author={Saroj Hirnwal and Kirti Chauhan and Amit Gupta},
  journal={International Journal of Computer Applications},
  year={2012},
  volume={37},
  pages={22-27}
}
In this paper ,we study the types of attacks in intrusion detection system in Mobile Ad Hoc network(MANET).Mobile Adhoc Networks are a relatively new and rapidly evolving area of interests. One such field concerns mobile adhoc networks (MANETs) in which mobile nodes organize themselves in a network without the help of any predefined infrastructure. Securing MANETs is an important part of deploying and utilizing them, since they are often used in critical applications where data and… 
3 Citations

Figures from this paper

A Cooperative Approach for Understanding Behavior of Intrusion Detection System in Mobile Ad Hoc Networks

TLDR
The various attacks, techniques used for in trusion detection are discussed and general issues that should be consi dered while implementing in intrusion detection sys tem in Mobile Ad hoc Network (MANET) to provide high performance to the network are discussed.

IDS with Hybrid ID3 Algorithm

TLDR
This project design and implement an IDS that is a software application and monitor network through a client server approach and to detect users activity the authors can use a process monitor for intruder detection.

Security Analysis and Application of Common Dynamic Routing Protocol

TLDR
This paper analyzes the existing routing security model active-n-m, attack model, parametric threat model and adaptive threat model, and proposes a hierarchical threat model that is more suitable for modeling routing security threats.

References

SHOWING 1-10 OF 17 REFERENCES

Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches

TLDR
This paper shows how ad hoc networks can be, to a certain extent, secured using traditional techniques, and examines the different intrusion detection techniques and point out the reasons why they usually cannot be used in an ad hoc context.

A framework of survivability model for wireless sensor network

TLDR
This work model and analyze each cluster of a hierarchical cluster based WSN as a stochastic process based on semi-Markov process (SMP) and discrete-time Markov chain (DTMC).

Investigation of MANET routing protocols for mobility and scalability

TLDR
This paper focuses on performance investigation of reactive and proactive MANET routing protocols, namely AODV, DSR, TORA and OLSR, in a varying network sizes with increasing area and nodes size.

Compromised Sensor Nodes Detection: A Quantitative Approach

  • Tao LiMin SongMansoor Alam
  • Computer Science
    2008 The 28th International Conference on Distributed Computing Systems Workshops
  • 2008
TLDR
A data transmission quality (DTQ) function is defined in a way that it will keep close to constant or change smoothly for legitimate nodes and will keep decreasing for suspicious nodes.

Intrusion Detection in Wireless Ad-Hoc Networks

TLDR
Intrusion detection in wireless ad-hoc networks / editors, Nabendu Chaki and Rituparna Chaki, contains information obtained from authentic and highly regarded sources.

On MANET Routing Protocols for Mobility and Scalability

  • A. ShresthaF. Tekiner
  • Computer Science
    2009 International Conference on Parallel and Distributed Computing, Applications and Technologies
  • 2009
TLDR
A performance comparison of the selected MANET routing protocols in a varying network sizes with increasing area and nodes size is presented to investigate mobility and scalability of the routing process.

Routing Protocols for Mobile Ad-hoc Networks : Current Development and Evaluation

TLDR
This paper examines the routing protocols and their newest improvements for Mobile Ad-hoc NETwork, discussing the metrics used to evaluate these protocols and highlighting the essential problems in the evaluation process itself.

Performance Comparison Of MANET Routing Protocols In Different Network Sizes Computer Science Project

TLDR
The scope of this project was to test routing performance of four different routing protocols (AODV, DSR, LAR 1 and ZRP) in variable network sizes up to thousand nodes in QualNet Simulator from Scalable Networks to perform the simulations.

Throughput and Delay Comparison of MANET Routing Protocols

TLDR
This paper studied and compared the performance of various routing protocols like Ad hoc On-Demand Vector routing (AODV), Fisheye, Dynamic MANET On-demand (DYMO), Source Tree Adaptive Routing (STAR) protocol, Routing Information Protocol (RIP), Bellman Ford, LANd Mark Ad hoc Routing protocol (LANMAR) and Location Aided Routing Protocol (LAR).

Mobile Ad Hoc Networks Simulations Using Routing Protocols for Performance Comparisons

TLDR
It is seen that mobile ad hoc networks will be an integral part of next generation networks because of its flexibility, infrastructure less nature, ease of maintenance, auto configuration, self administration capabilities, and costs effectiveness.