A Survey on Intrusion Detection Techniques in MANET

被引:4
|
作者
Soni, Mohit [1 ]
Ahirwar, Manish [1 ]
Agrawal, Shikha [1 ]
机构
[1] Univ Inst Technol, Dept Comp Sci & Engn, Bhopal, India
关键词
Mobile Ad hoc Network; Intrusion Detection System (IDS); IDS in MANET; Security Issues in MANET;
D O I
10.1109/CICN.2015.204
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The mobile ad-hoc network (MANET) is a new wireless technology, having features like dynamic topology and self-configuring ability of nodes. The self configuring ability of nodes in MANET made it popular among the critical situation such as military use and emergency recovery. But due to open medium and broad distribution of nodes make MANET vulnerable to different attacks. So to protect MANET from various attacks, it is important to develop an efficient and secure system for MANET. Intrusion means any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource. Intrusion Prevention is the primary defense because it is the first step to make the systems secure from attacks by using passwords, biometrics etc. Even if intrusion prevention methods are used, the system may be subjected to some vulnerability. So we need a second wall of defense known as Intrusion Detection Systems (IDSs), to detect and produce responses whenever necessary. In this article we present a survey of various intrusion detection schemes available for ad hoc networks. We have also described some of the basic attacks present in ad hoc network and discussed their available solution.
引用
收藏
页码:1027 / 1032
页数:6
相关论文
共 50 条
  • [1] A Survey on Intrusion Detection Techniques in MANET
    20163702795437
    [J]. (1) Department of Computer Science and Engineering, University Institute of Technology, Bhopal, India, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [2] Intrusion detection with neural networks and watermarking techniques for MANET
    Mitrokotsa, Aikaterini
    Komninos, Nikos
    Douligeris, Christos
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 118 - +
  • [3] Survey of intrusion detection techniques
    Lunt, Teresa F.
    [J]. Computers and Security, 1993, 12 (04): : 405 - 418
  • [4] A survey of intrusion detection techniques in Cloud
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Hiren
    Patel, Avi
    Rajarajan, Muttukrishnan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 42 - 57
  • [5] On Effective Sampling Techniques for Host-based Intrusion Detection in MANET
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie
    Liu, Hui
    Yu, Wei
    Reschly, Robert
    [J]. 2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [6] Malicious node identification using quantitative intrusion detection techniques in MANET
    M. Arul Selvan
    S. Selvakumar
    [J]. Cluster Computing, 2019, 22 : 7069 - 7077
  • [7] A robust intrusion detection system using machine learning techniques for MANET
    Ravi, N.
    Ramachandran, G.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2020, 24 (03) : 253 - 260
  • [8] Malicious node identification using quantitative intrusion detection techniques in MANET
    Selvan, M. Arul
    Selvakumar, S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7069 - S7077
  • [9] Intrusion Detection Algorithm for MANET
    Srinivasan, S.
    Alampalayam, S. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (03) : 36 - 49
  • [10] Intrusion Detection System for MANET
    Zalte, S. S.
    Ghorpade, V. R.
    [J]. 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,