Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks

@inproceedings{Shamsh2013RoamingHA,
  title={Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks},
  author={Sabah Shamsh and Vandana Dubey},
  year={2013}
}
At the present time, Mobile Ad-Hoc Networks are being used in wide variety of applications, such as, mobile commerce, transportation, sensor networks etc. Hence, secure deployment of MANETs is a necessary condition because MANETs are most vulnerable to attacks. Lots of research has been performed on deployment of IDS in MANETs, but, using honeypots in MANETs is a new concept. Honeypots are used to uncover the motive of attacks on any network. Only one model for using honeypots in MANETs has… CONTINUE READING

Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

Honeypots: catching the insider threat

  • 19th Annual Computer Security Applications Conference, 2003. Proceedings.
  • 2003
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

An Intrusion Detection System Based on Honeypot Technology

  • 2012 International Conference on Computer Science and Electronics Engineering
  • 2012

Implementing network defence using deception in a wireless honeypot

  • Australian Computer, Network & Information Forensics Conference
  • 2004

Roaming honeypots for mitigating service-level denial-of-service attacks

  • 24th International Conference on Distributed Computing Systems, 2004. Proceedings.
  • 2004
VIEW 2 EXCERPTS