CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET

by R. Arunkumar, A. Annalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 8
Year of Publication: 2014
Authors: R. Arunkumar, A. Annalakshmi
10.5120/14859-3230

R. Arunkumar, A. Annalakshmi . A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. International Journal of Computer Applications. 85, 8 ( January 2014), 8-15. DOI=10.5120/14859-3230

@article{ 10.5120/14859-3230,
author = { R. Arunkumar, A. Annalakshmi },
title = { A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 8 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 8-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number8/14859-3230/ },
doi = { 10.5120/14859-3230 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:01:54.952634+05:30
%A R. Arunkumar
%A A. Annalakshmi
%T A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 8
%P 8-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-hoc Network (MANET) is a mobile and multi-hop autonomous operation of wireless network. Collection of wireless mobile nodes way of forms a temporary network without using any pre-existing infrastructures. Intrusion Detection & Prevention System (IDPS) is one of the defence mechanisms to protect MANET against variety of attacks due to the dynamic topology, lack of centralized control, limited physical security and energy constrained operations. This paper aims to focus on monitored the most prominent techniques of IDS approach for determining under the conditions of critical nodes and also trigger & compare the recent Intrusion Detection mechanism based on their architecture and data gathering techniques.

References
  1. Ali Ghaffari. "Vulnerability and Security of Mobile Ad hoc Networks". Proceedings of the 6th WSEAS International Conference on Simulation, Modeling and Optimization, Lisbon, Portugal, September 22-24, 2006.
  2. Christos Xenakis. , Christoforos Panos. , Ioannis Stavrakakis. "A comparative evaluation of intrusion detection architectures for mobile ad hoc networks". ELSEVIER Computers & Security 30(2011), page no 6 3 – 80.
  3. Nadeem, A. , & Howarth, M. (2009). "Adaptive intrusion detection & prevention of denial of service attacks in MANETs". In Proceeding of ACM 5th international wireless communication and mobile computing conference. Germany, June16.
  4. Karan Singh, R. S. Yadav, Ranvijay, "A REVIEW PAPER ON AD HOC NETWORK SECURITY". International Journal of Computer Science and Security, Volume (1):Issue (1)
  5. Levente Butty, Jean-Pierre Hubaux, "Report on a Working Session on Security in Wireless Ad Hoc Networks". Mobile Computing and Communications Review, Volume 6, Number 4.
  6. Sergio Pastrana. , Aikaterini Mitrokotsa. , Agustin Orfila. , Pedro Peris-Lopez. "Evaluation of classification algorithms for intrusion detection in MANETs". ELSEVIER Knowledge-Based Systems 36 (2012) 217–225.
  7. Charlie Obimbo, Liliana Maria Arboleda-Cobo. "An Intrusion Detection System for MANET". Communications in Information Science and Management Engineering (CISME) Vol. 2 No. 3 2012 PP. 1-5 www. jcisme. org ?C 2011-2012 World Academic Publishing.
  8. Farhan Abdel-Fattah. , Farhan Abdel-Fattah. , Shaidah Jusoh. "Distributed and Cooperative Hierarchical Intrusion Detection on MANETs". Published by International Journal of Computer Applications (0975 – 8887) Volume 12– No. 5, December 2010.
  9. Pin Nie, "Security in Ad hoc Network", 2006.
  10. Adnan Nadeem, Michael Howarth. "Protection of MANETs from a range of attacks using an intrusion detection and prevention system". © Springer Science + Business Media, LLC 2011.
  11. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, and Prabir Bhattacharya. "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET". In Proceeding of IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 1, JANUARY-FEBRUARY 2011.
  12. Elhadi M. Shakshuki. , Nan Kang, Tarek R. Sheltami. "EAACK—A Secure Intrusion-Detection System for MANETs". IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3 MARCH 2013 1089.
  13. Li, Z. , Das, A. , & Zhou, J. (2005). "Theoretical basis for intrusion detection". In IEEE workshop proceedings on information assurance and security, 15–17 June (pp. 184–192).
  14. Farhan A. F. , Zulkhairi D. , M. T. Hatim. "Mobile Agent Intrusion Detection System for Mobile Ad Hoc Networks: A Non-overlapping Zone Approach". ©at UNIVERSITI UTARA MALAYSIA from November 11, 2008 IEEE Xplore onwards.
  15. Sanzgiri, K. , & Belding-Royer, M. (2002). "A secure routing protocol for ad hoc networks". In Proceedings of 10th IEEE international conference on network protocol (ICNP' 02).
  16. Padilla, E. , Aschenbruck, N. , Martini, P. , Jahnke, M. , & Tolle, J. (2007). "Detecting black hole attack in tactical MANETs using topology graph". In Proceeding of 32nd IEEE conference on local computer networks.
  17. Zhang, Y. , & Lee, W. (2000). "Intrusion detection in wireless adhoc networks". In Proceeding of 6th ACM MOBICOM.
  18. Yu, W. , & Ray, K. (2005). "Defence against injecting traffic attack in cooperative ad hoc networks". In IEEE global telecommunication conference Globecom.
  19. Yi, P. , Dai, Z. , & Zhang, S. (2005). "Resisting flooding attack in ad hoc networks". In Proceeding of IEEE conference on information technology: coding and computing, Vol. 2 (pp. 657–662).
  20. R. H. Akbani, S. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: A survey," in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection and Prevention Mobile Ad hoc Networks Watchdog CPDOD Intrusion detection system CP-KNN Intrusion Detection & Prevention System.