Call for Paper - June 2019 Edition
IJCA solicits original research papers for the June 2019 Edition. Last date of manuscript submission is May 20, 2019. Read More

Intrusion Detection System in Mobile Ad-hoc Network

Print
PDF
IJCA Proceedings on International Conference on Advances in Science and Technology
© 2015 by IJCA Journal
ICAST 2014 - Number 2
Year of Publication: 2015
Authors:
Trupti . P. Patil
Bharti Joshi

Trupti p Patil and Bharti Joshi. Article: Intrusion Detection System in Mobile Ad-hoc Network. IJCA Proceedings on International Conference on Advances in Science and Technology ICAST 2014(2):10-14, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Trupti .p. Patil and Bharti Joshi},
	title = {Article: Intrusion Detection System in Mobile Ad-hoc Network},
	journal = {IJCA Proceedings on International Conference on Advances in Science and Technology},
	year = {2015},
	volume = {ICAST 2014},
	number = {2},
	pages = {10-14},
	month = {February},
	note = {Full text available}
}

Abstract

In recent years, the security issues on MANET have become one of the primary concerns. A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile connected without wires. IDSs are designed for wired networks and work only under certain conditions, i. e. having an infrastructure with central authority, no cooperative algorithms. Security is mainly achieved by prevention, i. e. to make attacks as difficult as possible These conditions are not or only partially fulfilled by MANETs. The MANET is more vulnerable to be attacked than wired network. For this reason, there is a need of mechanism to detect and response these newer attacks, i. e. "intrusion detection". The disadvantage of misuse detection is unable to detect Unknown attack and anomaly detection generates the false alarm any time traffic. To solve this problems we are combining anomaly and misuse detection technique to explore and to classify current techniques of Intrusion Detection System that aware MANET. This Paper organized into four part first part contains introduction of IDS,MANET ,second part contains attacks on MANET ,third part contains proposed model and last part contains conclusion and references.

References

  • Anantvalee T, Wu J (2006) A Survey on Intrusion Detection in Mobile Ad Hoc Networks. Wirel/MobilE Netw Secur, Springer:170-196 .
  • Axelsson S (2000) Intrusion Detection Systems: A Survey and Taxonomy. Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology .
  • Buchegger S, Le Boudec J (2002) Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Network. In Proc of 10th Euromicro Workshop on Parallel, Distrib and Netw-based Process:403-410 .
  • Heady R, Luger G, Maccabe A, Servilla M (1990) The architecture of a net-work level intrusion detection system Technical Report, Computer Science Department, University of New Mexico.
  • Huang Y, Lee W (2003) A Cooperative Intrusion Detection System for Ad Hoc Networks. In Proc of the 1st ACM Workshop on Secur of Ad Hoc and Sens Netw:135-147.
  • Huang Y, Lee W (2004) Attack Analysis and Detection for Ad Hoc Routing Protocols. In Proc of Recent Adv in Intrusion Detect LNCS 3224:125-145 .
  • Parker J, Undercoffer Jetal (2004) On Intrusion Detection and Response for Mobile Ad Hoc Networks. In Proc of 23rd IEEE Int Perform Comput and Commun Conf .
  • Smith AB (2001) An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks. In Proc of 5th Natl Colloq for Inf Syst Secur Educ.
  • Zhang Y, Lee W (2011) Intrusion Detection Techniques for Mobile Wireless Networks. Wirel Netw : 545-556 .
  • Intrusion detection system:Acomprehensivereview Hung-Jen Liao, hun-HungRichardLin ,Ying-ChihLin Kuang-Yuan Tun. Wormhole Attack in Wireless Ad-Hoc Networks Yahiya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour. International Journal of Computer Theory and Engineering Vol. 4, No. 2, April 2012.
  • ISOLATION OF MALICIOUS NODE IN DOS SCENARIO IN MANET Pooja Er. Deepika Khokhar- ISSN:2229-6093
  • Attacks and Intrusion Detection in Mobile AdHoc Network Assignment in Computer Science, Philippe Hunberbühler Supervisors Prof. Dr. Burkhard Stiller, Dr. Hasan Greg Schaffrath,University of zurich.