CFP last date
20 December 2024
Reseach Article

Article:Comparative study of Distributed Intrusion Detection in Ad-hoc Networks

by Sumitra Menaria, Prof Sharada Valiveti, Dr K Kotecha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 9
Year of Publication: 2010
Authors: Sumitra Menaria, Prof Sharada Valiveti, Dr K Kotecha
10.5120/1237-1699

Sumitra Menaria, Prof Sharada Valiveti, Dr K Kotecha . Article:Comparative study of Distributed Intrusion Detection in Ad-hoc Networks. International Journal of Computer Applications. 8, 9 ( October 2010), 11-16. DOI=10.5120/1237-1699

@article{ 10.5120/1237-1699,
author = { Sumitra Menaria, Prof Sharada Valiveti, Dr K Kotecha },
title = { Article:Comparative study of Distributed Intrusion Detection in Ad-hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 9 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number9/1237-1699/ },
doi = { 10.5120/1237-1699 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:57.628230+05:30
%A Sumitra Menaria
%A Prof Sharada Valiveti
%A Dr K Kotecha
%T Article:Comparative study of Distributed Intrusion Detection in Ad-hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 9
%P 11-16
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years ad hoc networks are widely used because of mobility and open architecture nature. But new technology always comes with its own set of problems. Security of ad hoc network is an area of widespread research in recent years. Some unique characteristics of ad hoc network itself are an immense dilemma in the way of security. In this paper we have presented study about characteristics of ad hoc network, how they are problematic in ad hoc network security, attacks in ad hoc network and brief description of some existing intrusion detection system. We have also justified why distributed intrusion detection is better for ad hoc network with comparative study of existing intrusion detections in ad hoc network.

References
  1. Ali Ghaffari. ”Vulnerability and Security of Mobile Ad hoc Networks”, Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, Lisbon, Portugal, September 22-24, 2006.
  2. Karan Singh, R. S. Yadav, Ranvijay, ”A REVIEW PAPER ON AD HOC NETWORK SECURITY”,International Journal of Computer Science and Security, Volume (1): Issue (1)
  3. Levente Butty, Jean-Pierre Hubaux,. ”Report on a Working Session on Security in Wireless Ad Hoc Networks”,Mobile Computing and Communications Review,Volume 6, Number 4
  4. Pin Nie, ”Security in Ad hoc Network”,2006.
  5. Yian Huang, Wenke Lee, ”A Cooperative Intrusion Detection System for Ad Hoc Networks”, In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 135147, Fairfax, Virginia, 2003. ACM Press.
  6. S.Madhavi,Dr. Tai Hoon Kim, ”AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS”, International Journal of Security and Its Applications Vol. 2, No.3, July, 2008
  7. Adam Burg,”Ad hoc network specific attacks,” 2003.
  8. Ioanna Stamouli,”Real-time Intrusion Detection for Ad hoc Networks”, in 2003.
  9. Tiranuch Anantvalee,Jie Wu, ”A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” c 2006 Springer.
  10. AikateriniMitrokotsa, Rosa Mavropodi, Christos Douligeris,”Intrusion Detection of Packet Dropping Attacks inMobile Ad Hoc Network” TAyia Napa, Cyprus, July 6-7, 2006.
  11. Himani Bathla, Kanika Lakhani, ”A Novel Method for Intrusion Detection System to Enhance Security in Ad hoc Network”, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 5, MAY 2010, ISSN 2151-9617
  12. Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah, ”A Survey on MANET Intrusion Detection”, in: International Journal of Computer Science and Security, Volume (2) : Issue (1).
  13. Farooq Anjum,Dhanant Subhadrabandhu and Saswati Sarkar, ”Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols”, in 2003
  14. P C Kishore Raja, Dr.M.Suganthi.M, R.Sunder, ”WIRELESS NODE BEHAVIOR BASED INTRUSION DETECTION USING GENETIC ALGORITHM”,Ubiquitous Computing and Communication Journal,2006.
  15. R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai,”SAgent Based Efficient Anomaly Intrusion Detection System in Adhoc networks”,IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February, 2010.
  16. Sampathkumar Veeraraghavan, S. Bose, K. Anand and A. Kannan, ”SAn Intelligent Agent Based Approach for Intrusion Detection and Prevention in Adhoc Networks”,IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007.
  17. O. Kachirski and R. Guha, ”Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03), p. 57.1, January 2003.
  18. Ricardo Puttini,Jean-Marc Percher, ”A Fully Distributed IDS for MANET”, in 2007.
  19. Adrian P. Lauf, Richard A. Peters, and William H. Robinson,”Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks”,in 2008.
  20. Yongguang Zhang,Wenke Lee,Yian Huang, ”Intrusion Detection Techniques for Mobile Wireless Networks”,Appear in ACM WINET Journal in 2003.
  21. Ping Yi, Yichuan Jiang, Yiping Zhong, Shiyong Zhang, ”Distributed Intrusion Detection for Mobile Ad Hoc Networks”,Proceedings of the The 2005 IEEE Symposium on Applications and the Internet Workshops AINT-W05.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Ad-hoc Networks