Abstract

A COMPREHENSIVE SURVEY ON INTRUSION DETECTION IN MOBILE AD-HOC NETWORK

ARACHANA SINGH, DR. RAJESH PATHAK

113-122

Vol: 1, Issue: 4, 2011

With the progression of computer networks extending boundaries, Mobile ad hoc network (MOBILE ADHOC NETWORK) has emerged as a new frontier of technology to provide anywhere, anytime communication. Due to its deployment nature, MOBILE AD-HOC NETWORKs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, limited power and limited bandwidth. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this paper we have surveyed various intrusion detection techniques in MOBILE AD-HOC NETWORK and analyzed their fruitfulness. The reliable website uhren replica provides best quality replica omega watches UK: De Ville, Seamaster, Speedmaster and Constellation.
You can possess cheap and luxury UK replica watches if you intensively read the website.

Download PDF

    References

  1. Dorothy E. Denning 'An Intrusion-detection Model” IEEE Transaction on Software Engineering, 13, No. 7, Pp 222232, Feb 1987.
  2. Ioanna Stamouli, Patroklos G. Argyroudis, and Hitesh Tewari 'Real-time Intrusion Detection for Ad hoc Networks” Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM’05) , 0-7695-2342-0/05 $20.00 © 2005 IEEE
  3. Zhang Anfd Lee 'Intrusion Detection System in Ad-hoc Networks” MOBICOM 2000 bostom MA USA
  4. Farooq Anjum, Dhanant Subhadrabandhu and Saswati Sarkar 'Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative Study of Various Routing Protocols”
  5. Xia Wang” Intrusion Detection Techniques in Wireless Ad Hoc Networks”.
  6. Yu Liu, Cristina Comaniciu and Hong Man 'A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks”.
  7. H.–Y. Chang, S.F. Wu and Y.F. Jou, “Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks”, ACM Tran. Inf. Sys.Sec., 1, Pp. 1-36, 2001
  8. A. Karygiannis, E. Antonakakis, and A. Apostolopoulos “Detecting Critical Nodes for MOBILE ADHOC NETWORK Intrusion Detection Systems”.
  9. D. St erne1, P. Balasubramanyam2, D. Carman1, B. Wilson1, R. Talpade3, C. Ko1,R. Balupari1, CY. Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 'A General Cooperat ive Intrusion Det ect ion Archi tecture for MOBILE AD-HOC NETWORKs”.
  10. Ningrinla Marching and Raja Datta 'Collaborative Technique for Intrusion Detection in Mobile Ad hoc Network” Ad hoc Networks, 6, Issue 4, June 2008 Page 508-523
  11. R.Ranjana and M.Rajaram, “Detecting Intrusion Attacks in Ad-hoc Networks,” Asian Journal i n Informati on Technology, 6(7) , 758-761, 2007, ISSN: 1682:3915, Macdwell Journal 2007
  12. S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, Pp. 255-265, 2000.
  13. O. Kachirski and R. Guha, “Effective Intrusion Detection using Multiple Sensors in Wireless Ad hoc Networks”, In Proc. 36th Annual Hawaii Int’l. Conf. on System Sciences ( HICSS’03 ) , Pp.57.1, 2003.
  14. K. Paul and D. Westhoff, “Context Aware Detection of Selfish Nodes in DSR based Ad hoc Networks”, In Proc. IEEE Vehicular Technology Conf., 2002
  15. Alekha Kumar Mishra1, Bibhu Dutta Sahoo2' Analysis of Security Attacks for AODV Protocol in Mobile Ad-hoc Network”.
  16. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong “A New Routing Attack in Mobile Ad Hoc Networks”.
  17. Pasquale Donadio,Antonio Cimmino and Giorgio Ventre “Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid Based Agnostic Middleware”.
  18. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc. ACM/IEEE Int’l. Conf. on Mobile Computing and Networking, Pp 275-283, 2000.
  19. Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang, “Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure,” Proceedings of DARPA Information Survivability Conference and Exposition, 2, Pp. 69-83, January 2000.
  20. V. Madhu Viswanatham and A.A. Chari “An Approach for Detecting Attacks in Mobile Adhoc Networks” Journal of Computer Science, 4 (3) : 245-251, 2008 ISSN 1549-3636 © 2008 Science Publications
  21. Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi “Investigating Intrusion Detection Systems in MOBILE AD-HOC NETWORK and Comparing IDSs for Detecting Misbehaving Nodes” World Academy of Science, Engineering and Technology, 44, 2008
  22. Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam “Addressing Security Concerns of Data Exchange in AODV Protocol”.
  23. Lidong Zhou and Zygmunt J. HaasHappy Sankranti/ pongalhttp://crackspider.net/ “Securing Ad Hoc Networks” In Proc IEEE, Special Issue on Network Security, November/December, 1999.
  24. Giovanni Vigna Sumit Gwalani Kavitha Srinivasan Elizabeth M. Belding-Royer Richard A. Kemmerer “An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks”.
  25. Anand Patwardhan, Jim Parker and Anupam Joshi “Secure Routing and Intrusion Detection in Ad Hoc Networks”.
  26. Tom Chen SMU, Dept of Electrical Engineeri ng tchen@engr.smu.edu http://www.engr.smu.edu/~tchen.
  27. Preetida Vinayakray-Jani “Security within Ad hoc Networks”.
  28. Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi “Investigating Intrusion Detection Systems in MOBILE AD-HOC NETWORK and Comparing IDSs for Detecting Misbehaving Nodes”.
  29. Marianne A. Azer,Sherif M. El-Kassas and Magdy S. El-Soudani “A Survey on Anomaly Detection Methods for Ad Hoc Networks”.
  30. Tiranuch Anantvalee and Jie Wu “A Survey on Intrusion Detection in Mobile Ad Hoc Networks”. 310 SUNITA SAHU & SHISHIR K. SHANDILYA
  31. S.Bose,P.Yogesh and A.Kannan “Neural Network Approach for Anomaly Intrusion Detection in Adhoc Networks using Agents” Internatinal Journal of Soft computing1, Medwell Online 2006.
  32. S.Madhavi and Dr. Tai Hoon Kim “An Intrusion Detection System in Mobile Ad hoc Networks” International Journal of Security and its Application, 2, No 3, July 2008.
  33. S.Sen and John Andrew Clark “A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks” March 2009, WiSec ’09: Proceedings of the Second ACM Conference on Wireless Network Security.
  34. B. Sun, K. Wu, and U. Pooch. “Zone-based Intrusion Detection for Mobile Ad hoc Networks”. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3) 2003.9.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

alexistogel

situs alexistogel

alexistogel

alexistogel slot

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

alexistogel

bandar alexistogel

alexistogel slot

alexistogel link alternatif

alexistogel macau

alexistogel

alexistogel toto macau

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel rtp

alexistogel

alexistogel slot

alexistogel

alexistogel

alexistogel

alexistogel terpercaya

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

alexistogel daftar

slot online dana

bandar togel slot

togel online terpercaya

slot pragmatic gacor

link situs slot resmi

situs slot online

link daftar togel slot

bandar slot gacor hari ini

bocoran pola slot

situs slot online

bandar slot online

bandar togel online

slot online terpercaya

togel slot online

slot deposit qris

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

situs slot gacor

rtp slot gacor

slot online gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

game slot online

togel online terpercaya

daftar togel slot online

bandar togel terpercaya

slot online gacor

trik slot bonus

prediksi togel online

rtp slot online

panduan togel online

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 bola slot

bandarbola855 rtp

bandarbola855 slot online

bandarbola855 link

bandarbola855 bandar

bandarbola855 slot terpercaya

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 online

slot bandarbola855

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

bandarbola855 slot

bandarbola855

bandarbola855 rtp

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet slot

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

bandar iosbet gacor

iosbet

iosbet

iosbet

iosbet

liatogel

bandar liatogel

login liatogel

live draw hk liatogel

liatogel slot online gacor

liatogel totomacau

liatogel link

slot gacor

daftar slot online

bandar slot dana

slot ovo

slot gopay