CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

FIDSM: Fuzzy Logic based Intrusion Detection Systems in Mobile Ad Hoc Networks

Published on September 2014 by Priyanka Dahiya, Alka Chaudhary
Recent Advances in Wireless Communication and Artificial Intelligence
Foundation of Computer Science USA
RAWCAI - Number 1
September 2014
Authors: Priyanka Dahiya, Alka Chaudhary
a69e2254-7cc3-4d35-8f0c-b200ed2d3596

Priyanka Dahiya, Alka Chaudhary . FIDSM: Fuzzy Logic based Intrusion Detection Systems in Mobile Ad Hoc Networks. Recent Advances in Wireless Communication and Artificial Intelligence. RAWCAI, 1 (September 2014), 45-47.

@article{
author = { Priyanka Dahiya, Alka Chaudhary },
title = { FIDSM: Fuzzy Logic based Intrusion Detection Systems in Mobile Ad Hoc Networks },
journal = { Recent Advances in Wireless Communication and Artificial Intelligence },
issue_date = { September 2014 },
volume = { RAWCAI },
number = { 1 },
month = { September },
year = { 2014 },
issn = 0975-8887,
pages = { 45-47 },
numpages = 3,
url = { /proceedings/rawcai/number1/17918-1414/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Recent Advances in Wireless Communication and Artificial Intelligence
%A Priyanka Dahiya
%A Alka Chaudhary
%T FIDSM: Fuzzy Logic based Intrusion Detection Systems in Mobile Ad Hoc Networks
%J Recent Advances in Wireless Communication and Artificial Intelligence
%@ 0975-8887
%V RAWCAI
%N 1
%P 45-47
%D 2014
%I International Journal of Computer Applications
Abstract

Security of mobile ad hoc networks is more challenging task due to its complex properties. In mobile ad hoc networks, intrusion detection system is known as the second line of defense because prevention based techniques are not a good solution for ad hoc networks due to its complex characteristics. For the security point of view, many intrusion detection systems have been proposed to mobile ad hoc networks in literature. This paper analyzed the proposed fuzzy logic based intrusion detection systems in mobile ad hoc networks.

References
  1. Y. Li and J. Wei. , "Guidelines on selecting intrusion detection methods in MANET", In Proceedings of the Information Systems Educators Conference, 2004.
  2. Bo Sun and Lawrence Osborne: Intrusion detection techniques in mobile ad hoc and wireless sensor network. In: IEEE Wireless Communications,1536-1284, 2007.
  3. R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The architecture of a network level intrusion detection system" Technical National Conference on Emerging Trends and Applications in Computer report, Computer Science Department, University of New Mexico, August 1990.
  4. B. Shanmugam and N. B. Idris, "Anomaly Intrusion Detection based on Fuzzy Logic and Data Mining", In Proceedings of the Postgraduate Annual Research Seminar, Malaysia 2006.
  5. M. Wahengbam and N. Marchang, "Intrusion detection in manet using fuzzy logic", 3rd IEEE Science (NCETACS), ISBN: 978-1-4577-0749-0, pp. 189 – 192, Shillong, 30-31 March 2012.
  6. S. Sujatha, P. Vivekanandan, A. Kannan, "Fuzzy logic controller based intrusion handling system for mobile ad hoc networks", Asian Journal of Information Technology, ISSN: 1682- 3915, pp. 175-182, 2008.
  7. S. Ahmed & S. M. Nirkhi, "A Fuzzy approach for forensic analysis of DDoS attack in manet" International Conference on Computer Science and Information Technology, ISBN: 978-93-82208-70-9, Hyderabad, 10th March 2013.
  8. Vydeki Dharmar and R. S. Bhuvaneswaran, "A combinatorial approach for design of fuzzy based intrusion detection system", proc. of international conference on computer applications (ICCA) 2012.
  9. M. B. Mukesh Krishnan, P. Sheik Abdul Khader, "Fuzzy Based Integrated Security Model for Mobile Ad Hoc Network", Global Trends in Computing and Communication Systems Communications in Computer and Information Science Volume 269, 2012, pp 467-472.
  10. Chaudhary, A. , Kumar, A. , & Tiwari, V. N. (2014, February), " A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs", In Optimization, Reliability, and Information Technology (ICROIT), 2014 International Conference on (pp. 178-181), IEEE.
  11. Chaudhary, A. , Tiwari, V. N. , & Kumar, A. (2014, February), "Design an anomaly based fuzzy intrusion detection system for packet dropping attack in mobile ad hoc network", In Advance Computing Conference (IACC), 2014 IEEE International (pp. 256-261), IEEE.
  12. Chaudhary, A. , Tiwari, V. N. , & Kumar, A. (2014, February), "Design an Anomaly Based Novel Approach for Detection of Sleep Deprivation Attack in Mobile Ad hoc networks Using Soft Computing", Proceedings of 3rd International Conference on Recent Trends in Engineering & Technology (ICRTET'2014), Elsevier.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networks (manets) Manets Security Issues Intrusion Detection System (ids) And Fuzzy Logic