CFP last date
22 April 2024
Reseach Article

Study of Intrusion Detection Techniques in MANET

Published on May 2012 by S. V. Shirbhate, V. M. Thakare, S. S. Sherekar
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 2
May 2012
Authors: S. V. Shirbhate, V. M. Thakare, S. S. Sherekar
cf07b29a-23fe-49f7-8f6f-91576d4e14c8

S. V. Shirbhate, V. M. Thakare, S. S. Sherekar . Study of Intrusion Detection Techniques in MANET. National Conference on Recent Trends in Computing. NCRTC, 2 (May 2012), 4-8.

@article{
author = { S. V. Shirbhate, V. M. Thakare, S. S. Sherekar },
title = { Study of Intrusion Detection Techniques in MANET },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 2 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 4-8 },
numpages = 5,
url = { /proceedings/ncrtc/number2/6520-1010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A S. V. Shirbhate
%A V. M. Thakare
%A S. S. Sherekar
%T Study of Intrusion Detection Techniques in MANET
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 2
%P 4-8
%D 2012
%I International Journal of Computer Applications
Abstract

MANET has no clear line of defense. Hence it is accessible to both legitimate network nodes and malicious node. Traditional ways of protecting the network are not sufficient and effective. Therefore intrusion detection system (IDS) is required that monitor the network and detect the misbehavior and anomalies. Intrusion detection is an important part of computer security. In this paper, discussion is on the need of intrusion detection system and also focuses on various intrusion detection techniques, especially anomaly intrusion detection techniques which are more crucial in MANET than misuse based detection techniques.

References
  1. Santoshi Kurosawa, Hidehisa Nakayama , Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile AdHoc Networks By Dynamic Learning Method", International Journal Of Network Security ,Vol. 5, No. 3, pp. 338-346,Nov,2007.
  2. R. Saminathan, Dr. K. Selvakumar, "PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network", International Journal of Computer Applications 0975 – 8887 Volume 7– No. 14, October 2010.
  3. S. Madhavi, "An Intrusion Detection System In Mobile Ad Hoc Networks", International Conference On Information Security And Assurance published in IEEE Computer Society,978-0-7695-3126-7/08,pp. 7-14,2008.
  4. R. Nakkeeran, T. Aruldoss Albert and R. Ezumalai, "Agent Based Efficient Anomaly Intrusion Detection System in Ad hoc Networks", International Journal of Engineering and Technology (IACSIT ) Vol. 2, No. 1, February, 2010.
  5. Chaoli Cai and Ajay Gupta , "Mobility–Pattern Based Anomaly Detection Algorithm in Mobile Networks", This full paper was peer reviewed at the direction of IEEE communication Society subject matter expert for publication in the ICC2008 proceedings. 978-1-4244-2075-9/08, pp. 1680-1684,2008.
  6. Yuebin Bai and Hidetsune Kobayashi, "Intrusion Detection System: Technology And Development", proceeding of 17th International conf. on Advanced Information Networking & Applications(AINA'03) published in computer society IEEE,0-7695-1906-7/03,2003.
  7. Foong Heng Wai ,Yin Nwe Aye, Ng Hian James, "Intrusion Detection in Wireless Ad-Hoc Networks" CS4274 Introduction to mobile computing,2004.
  8. Jiong Zhang and Mohammad Zulkernine, "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection", Proceeding of IEEE workshop on Information Assurance United status Miltary Acadamy, 2005.
  9. L. Prema Rajeswari, R. Arockia Xavier Annie, A. Kannan, "Enhanced Intrusion Detection Techniques for Mobile Ad Hoc Networks", IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES), pp. 1008-1013, Dec 20-22, 2007.
  10. U. Fayyad, G. Piatesky-Shapiro and P. Smyth, "From Data Mining To Knowledge Discovery in Databases", articles in AI Magazine,1996.
  11. Preetee K. Karmore , Smita M. Nirkhi, "Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining" International Journal of Computer Science and Information Technologies, (IJCSIT) Vol. 2 (4) pp. 1774-1779, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Ids Intrusion Detection System Misuse Ids Manet