Proceedings. ISCC 2004. Ninth International Symposium on Computers and Communications (IEEE Cat. No.04TH8769) 2004
DOI: 10.1109/iscc.2004.1358426
|View full text |Cite
|
Sign up to set email alerts
|

A fully distributed IDS for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…We assume that each Manet node executes one local instance of the IDS, called L-IDS. The L-IDS data collector executes periodic pooling to a local SNMP agent [6]. This is equivalent to processing the IDS algorithms with the values assumed by the MIB variables that are stored inside the *.mib files.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We assume that each Manet node executes one local instance of the IDS, called L-IDS. The L-IDS data collector executes periodic pooling to a local SNMP agent [6]. This is equivalent to processing the IDS algorithms with the values assumed by the MIB variables that are stored inside the *.mib files.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…This architectural design was explored in V. Mittal and G. Vigna [5] who present an IDS formed by various sensors to detect attacks against the routing protocol that monitors promiscuously the network links. In a previous work, R. Puttini et al [6] present the design of a fully-distributed IDS architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, even though the idea of integrated detection and response model seems feasible, it appears that the implementation and simulation have not been conducted. Similarly, few related IDA models propose response actions/frameworks for responding to the attacks once it is detected [57][58][59][60][61][62][63][64][65]. However the response system incorporating all those actions is not implemented.…”
Section: Review Of Manet Intrusion Response Securitymentioning
confidence: 99%
“…As a result, we propose a distributed network monitor architecture which traces data flow on each node by means of finite state machine. [18]. In fully distributed IDS distribution is not restricted to data collection but also applied to execution of the detection algorithm and alert correlation.…”
Section: ) Global Integrationmentioning
confidence: 99%