Abstract

A COMPREHENSIVE SURVEY ON INTRUSION DETECTION IN MOBILE AD-HOC NETWORK

ARACHANA SINGH, DR. RAJESH PATHAK

113-122

Vol: 1, Issue: 4, 2011

With the progression of computer networks extending boundaries, Mobile ad hoc network (MOBILE ADHOC NETWORK) has emerged as a new frontier of technology to provide anywhere, anytime communication. Due to its deployment nature, MOBILE AD-HOC NETWORKs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, limited power and limited bandwidth. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this paper we have surveyed various intrusion detection techniques in MOBILE AD-HOC NETWORK and analyzed their fruitfulness. The reliable website uhren replica provides best quality replica omega watches UK: De Ville, Seamaster, Speedmaster and Constellation.
You can possess cheap and luxury UK replica watches if you intensively read the website.

Download PDF

    References

  1. Dorothy E. Denning 'An Intrusion-detection Model” IEEE Transaction on Software Engineering, 13, No. 7, Pp 222232, Feb 1987.
  2. Ioanna Stamouli, Patroklos G. Argyroudis, and Hitesh Tewari 'Real-time Intrusion Detection for Ad hoc Networks” Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM’05) , 0-7695-2342-0/05 $20.00 © 2005 IEEE
  3. Zhang Anfd Lee 'Intrusion Detection System in Ad-hoc Networks” MOBICOM 2000 bostom MA USA
  4. Farooq Anjum, Dhanant Subhadrabandhu and Saswati Sarkar 'Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative Study of Various Routing Protocols”
  5. Xia Wang” Intrusion Detection Techniques in Wireless Ad Hoc Networks”.
  6. Yu Liu, Cristina Comaniciu and Hong Man 'A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks”.
  7. H.–Y. Chang, S.F. Wu and Y.F. Jou, “Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks”, ACM Tran. Inf. Sys.Sec., 1, Pp. 1-36, 2001
  8. A. Karygiannis, E. Antonakakis, and A. Apostolopoulos “Detecting Critical Nodes for MOBILE ADHOC NETWORK Intrusion Detection Systems”.
  9. D. St erne1, P. Balasubramanyam2, D. Carman1, B. Wilson1, R. Talpade3, C. Ko1,R. Balupari1, CY. Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 'A General Cooperat ive Intrusion Det ect ion Archi tecture for MOBILE AD-HOC NETWORKs”.
  10. Ningrinla Marching and Raja Datta 'Collaborative Technique for Intrusion Detection in Mobile Ad hoc Network” Ad hoc Networks, 6, Issue 4, June 2008 Page 508-523
  11. R.Ranjana and M.Rajaram, “Detecting Intrusion Attacks in Ad-hoc Networks,” Asian Journal i n Informati on Technology, 6(7) , 758-761, 2007, ISSN: 1682:3915, Macdwell Journal 2007
  12. S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, Pp. 255-265, 2000.
  13. O. Kachirski and R. Guha, “Effective Intrusion Detection using Multiple Sensors in Wireless Ad hoc Networks”, In Proc. 36th Annual Hawaii Int’l. Conf. on System Sciences ( HICSS’03 ) , Pp.57.1, 2003.
  14. K. Paul and D. Westhoff, “Context Aware Detection of Selfish Nodes in DSR based Ad hoc Networks”, In Proc. IEEE Vehicular Technology Conf., 2002
  15. Alekha Kumar Mishra1, Bibhu Dutta Sahoo2' Analysis of Security Attacks for AODV Protocol in Mobile Ad-hoc Network”.
  16. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong “A New Routing Attack in Mobile Ad Hoc Networks”.
  17. Pasquale Donadio,Antonio Cimmino and Giorgio Ventre “Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid Based Agnostic Middleware”.
  18. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc. ACM/IEEE Int’l. Conf. on Mobile Computing and Networking, Pp 275-283, 2000.
  19. Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang, “Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure,” Proceedings of DARPA Information Survivability Conference and Exposition, 2, Pp. 69-83, January 2000.
  20. V. Madhu Viswanatham and A.A. Chari “An Approach for Detecting Attacks in Mobile Adhoc Networks” Journal of Computer Science, 4 (3) : 245-251, 2008 ISSN 1549-3636 © 2008 Science Publications
  21. Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi “Investigating Intrusion Detection Systems in MOBILE AD-HOC NETWORK and Comparing IDSs for Detecting Misbehaving Nodes” World Academy of Science, Engineering and Technology, 44, 2008
  22. Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam “Addressing Security Concerns of Data Exchange in AODV Protocol”.
  23. Lidong Zhou and Zygmunt J. HaasHappy Sankranti/ pongalhttp://crackspider.net/ “Securing Ad Hoc Networks” In Proc IEEE, Special Issue on Network Security, November/December, 1999.
  24. Giovanni Vigna Sumit Gwalani Kavitha Srinivasan Elizabeth M. Belding-Royer Richard A. Kemmerer “An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks”.
  25. Anand Patwardhan, Jim Parker and Anupam Joshi “Secure Routing and Intrusion Detection in Ad Hoc Networks”.
  26. Tom Chen SMU, Dept of Electrical Engineeri ng tchen@engr.smu.edu http://www.engr.smu.edu/~tchen.
  27. Preetida Vinayakray-Jani “Security within Ad hoc Networks”.
  28. Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi “Investigating Intrusion Detection Systems in MOBILE AD-HOC NETWORK and Comparing IDSs for Detecting Misbehaving Nodes”.
  29. Marianne A. Azer,Sherif M. El-Kassas and Magdy S. El-Soudani “A Survey on Anomaly Detection Methods for Ad Hoc Networks”.
  30. Tiranuch Anantvalee and Jie Wu “A Survey on Intrusion Detection in Mobile Ad Hoc Networks”. 310 SUNITA SAHU & SHISHIR K. SHANDILYA
  31. S.Bose,P.Yogesh and A.Kannan “Neural Network Approach for Anomaly Intrusion Detection in Adhoc Networks using Agents” Internatinal Journal of Soft computing1, Medwell Online 2006.
  32. S.Madhavi and Dr. Tai Hoon Kim “An Intrusion Detection System in Mobile Ad hoc Networks” International Journal of Security and its Application, 2, No 3, July 2008.
  33. S.Sen and John Andrew Clark “A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks” March 2009, WiSec ’09: Proceedings of the Second ACM Conference on Wireless Network Security.
  34. B. Sun, K. Wu, and U. Pooch. “Zone-based Intrusion Detection for Mobile Ad hoc Networks”. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3) 2003.9.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.