CFP last date
22 July 2024
Reseach Article

Intrusion Detection System in Mobile Ad-hoc Network

Published on February 2015 by Trupti .p. Patil, Bharti Joshi
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2014 - Number 2
February 2015
Authors: Trupti .p. Patil, Bharti Joshi

Trupti .p. Patil, Bharti Joshi . Intrusion Detection System in Mobile Ad-hoc Network. International Conference on Advances in Science and Technology. ICAST2014, 2 (February 2015), 10-14.

author = { Trupti .p. Patil, Bharti Joshi },
title = { Intrusion Detection System in Mobile Ad-hoc Network },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2015 },
volume = { ICAST2014 },
number = { 2 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 10-14 },
numpages = 5,
url = { /proceedings/icast2014/number2/19476-5022/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Trupti .p. Patil
%A Bharti Joshi
%T Intrusion Detection System in Mobile Ad-hoc Network
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2014
%N 2
%P 10-14
%D 2015
%I International Journal of Computer Applications

In recent years, the security issues on MANET have become one of the primary concerns. A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile connected without wires. IDSs are designed for wired networks and work only under certain conditions, i. e. having an infrastructure with central authority, no cooperative algorithms. Security is mainly achieved by prevention, i. e. to make attacks as difficult as possible These conditions are not or only partially fulfilled by MANETs. The MANET is more vulnerable to be attacked than wired network. For this reason, there is a need of mechanism to detect and response these newer attacks, i. e. "intrusion detection". The disadvantage of misuse detection is unable to detect Unknown attack and anomaly detection generates the false alarm any time traffic. To solve this problems we are combining anomaly and misuse detection technique to explore and to classify current techniques of Intrusion Detection System that aware MANET. This Paper organized into four part first part contains introduction of IDS,MANET ,second part contains attacks on MANET ,third part contains proposed model and last part contains conclusion and references.

  1. Anantvalee T, Wu J (2006) A Survey on Intrusion Detection in Mobile Ad Hoc Networks. Wirel/MobilE Netw Secur, Springer:170-196 .
  2. Axelsson S (2000) Intrusion Detection Systems: A Survey and Taxonomy. Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology .
  3. Buchegger S, Le Boudec J (2002) Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Network. In Proc of 10th Euromicro Workshop on Parallel, Distrib and Netw-based Process:403-410 .
  4. Heady R, Luger G, Maccabe A, Servilla M (1990) The architecture of a net-work level intrusion detection system Technical Report, Computer Science Department, University of New Mexico.
  5. Huang Y, Lee W (2003) A Cooperative Intrusion Detection System for Ad Hoc Networks. In Proc of the 1st ACM Workshop on Secur of Ad Hoc and Sens Netw:135-147.
  6. Huang Y, Lee W (2004) Attack Analysis and Detection for Ad Hoc Routing Protocols. In Proc of Recent Adv in Intrusion Detect LNCS 3224:125-145 .
  7. Parker J, Undercoffer Jetal (2004) On Intrusion Detection and Response for Mobile Ad Hoc Networks. In Proc of 23rd IEEE Int Perform Comput and Commun Conf .
  8. Smith AB (2001) An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks. In Proc of 5th Natl Colloq for Inf Syst Secur Educ.
  9. Zhang Y, Lee W (2011) Intrusion Detection Techniques for Mobile Wireless Networks. Wirel Netw : 545-556 .
  10. Intrusion detection system:Acomprehensivereview Hung-Jen Liao, hun-HungRichardLin ,Ying-ChihLin Kuang-Yuan Tun. Wormhole Attack in Wireless Ad-Hoc Networks Yahiya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour. International Journal of Computer Theory and Engineering Vol. 4, No. 2, April 2012.
  12. Attacks and Intrusion Detection in Mobile AdHoc Network Assignment in Computer Science, Philippe Hunberbühler Supervisors Prof. Dr. Burkhard Stiller, Dr. Hasan Greg Schaffrath,University of zurich.
Index Terms

Computer Science
Information Sciences


Ids Attack Manet Security