Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Study of Intrusion Detection Techniques in MANET

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 2
Year of Publication: 2012
Authors:
S. V. Shirbhate
V. M. Thakare
S. S. Sherekar

S V Shirbhate, V M Thakare and S S Sherekar. Article: Study of Intrusion Detection Techniques in MANET. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(2):4-8, May 2012. Full text available. BibTeX

@article{key:article,
	author = {S. V. Shirbhate and V. M. Thakare and S. S. Sherekar},
	title = {Article: Study of Intrusion Detection Techniques in MANET},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {2},
	pages = {4-8},
	month = {May},
	note = {Full text available}
}

Abstract

MANET has no clear line of defense. Hence it is accessible to both legitimate network nodes and malicious node. Traditional ways of protecting the network are not sufficient and effective. Therefore intrusion detection system (IDS) is required that monitor the network and detect the misbehavior and anomalies. Intrusion detection is an important part of computer security. In this paper, discussion is on the need of intrusion detection system and also focuses on various intrusion detection techniques, especially anomaly intrusion detection techniques which are more crucial in MANET than misuse based detection techniques.

References

  • Santoshi Kurosawa, Hidehisa Nakayama , Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile AdHoc Networks By Dynamic Learning Method", International Journal Of Network Security ,Vol. 5, No. 3, pp. 338-346,Nov,2007.
  • R. Saminathan, Dr. K. Selvakumar, "PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network", International Journal of Computer Applications 0975 – 8887 Volume 7– No. 14, October 2010.
  • S. Madhavi, "An Intrusion Detection System In Mobile Ad Hoc Networks", International Conference On Information Security And Assurance published in IEEE Computer Society,978-0-7695-3126-7/08,pp. 7-14,2008.
  • R. Nakkeeran, T. Aruldoss Albert and R. Ezumalai, "Agent Based Efficient Anomaly Intrusion Detection System in Ad hoc Networks", International Journal of Engineering and Technology (IACSIT ) Vol. 2, No. 1, February, 2010.
  • Chaoli Cai and Ajay Gupta , "Mobility–Pattern Based Anomaly Detection Algorithm in Mobile Networks", This full paper was peer reviewed at the direction of IEEE communication Society subject matter expert for publication in the ICC2008 proceedings. 978-1-4244-2075-9/08, pp. 1680-1684,2008.
  • Yuebin Bai and Hidetsune Kobayashi, "Intrusion Detection System: Technology And Development", proceeding of 17th International conf. on Advanced Information Networking & Applications(AINA'03) published in computer society IEEE,0-7695-1906-7/03,2003.
  • Foong Heng Wai ,Yin Nwe Aye, Ng Hian James, "Intrusion Detection in Wireless Ad-Hoc Networks" CS4274 Introduction to mobile computing,2004.
  • Jiong Zhang and Mohammad Zulkernine, "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection", Proceeding of IEEE workshop on Information Assurance United status Miltary Acadamy, 2005.
  • L. Prema Rajeswari, R. Arockia Xavier Annie, A. Kannan, "Enhanced Intrusion Detection Techniques for Mobile Ad Hoc Networks", IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES), pp. 1008-1013, Dec 20-22, 2007.
  • U. Fayyad, G. Piatesky-Shapiro and P. Smyth, "From Data Mining To Knowledge Discovery in Databases", articles in AI Magazine,1996.
  • Preetee K. Karmore , Smita M. Nirkhi, "Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining" International Journal of Computer Science and Information Technologies, (IJCSIT) Vol. 2 (4) pp. 1774-1779, 2011.