CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Multilayer Intrusion Detection in MANET

by J. Godwin Ponsam, R. Srinivasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 20
Year of Publication: 2014
Authors: J. Godwin Ponsam, R. Srinivasan
10.5120/17302-7790

J. Godwin Ponsam, R. Srinivasan . Multilayer Intrusion Detection in MANET. International Journal of Computer Applications. 98, 20 ( July 2014), 40-43. DOI=10.5120/17302-7790

@article{ 10.5120/17302-7790,
author = { J. Godwin Ponsam, R. Srinivasan },
title = { Multilayer Intrusion Detection in MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 20 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number20/17302-7790/ },
doi = { 10.5120/17302-7790 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:44.749060+05:30
%A J. Godwin Ponsam
%A R. Srinivasan
%T Multilayer Intrusion Detection in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 20
%P 40-43
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection system plays a major role in Mobile Adhoc Network (MANET). There are lots of attacks in MANET due to its vulnerabilities. Many Intrusion Detection System (IDS) like standalone IDS, Hierarchical IDS, Distributed IDS, Cooperative IDS are available in MANET but still suffers due to multilayer attacks such as (Denial of Service) DOS attack. In this paper we have proposed a Multilayer Intrusion detection to detect intrusions in MANET. We have used fixed clustering algorithm for detecting the intrusions. We have done experiments on multiple layer ids and single layer ids and found multiple layer ids can detect intrusions better than single layer ids.

References
  1. J. Godwin Ponsam, R. Srinivasan, " A Survey on MANET Security Challenges, Attacks and its Countermeasures, in IJETTCS, 2014
  2. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad-Hoc Networks," in IEEE Wireless Communications, pp. 48- 60, February 2004.
  3. L. Yu, L. Yang, and M. Hong, "Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks," in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, pp. 418-420, September 2005.
  4. Y. Zhang, W. Lee, and Y. -A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM J. Wireless Networks, pp. 545- 556, 2003
  5. V. Srivastava and M. Motani, . Cross-layer design: A survey and the road ahead,. in IEEE Communications Magazine, pp. 112. 119, December 2005.
  6. Satria Mandala, Md. Asri Ngadi, A. Hanan Abdullah, "A Survey on MANET Intrusion Detection," International Journal of Computer Science and Security, 2007, Volume (2): Issue (1), pp. 1-11.
Index Terms

Computer Science
Information Sciences

Keywords

IDS DOS MANET Attacks