2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733)
DOI: 10.1109/wcnc.2004.1311294
|View full text |Cite
|
Sign up to set email alerts
|

A novel intrusion detection approach for wireless ad hoc networks

Abstract: The potential for rapid and infrastructure-less deployment in harsh geographic terrain as well as in conference-room like scenarios has propelled research on wireless ad hoc networks (MANETs). However, these networks are vulnerable to attackers due to certain inherently vulnerable characteristics. With intrusion prevention measures not guaranteed to work all the time, the need to constantly monitor what is going on in a system and look for intrusions is fulfilled by intrusion detection systems (IDS). In this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 6 publications
0
9
0
1
Order By: Relevance
“…In Threshold Based [8] IDS, audit data analysis of network information along with Threshold Analysis Module to adapt network behavior by varying the threshold to identify attacks, incurs some processing overhead.…”
Section: Processing Overheadmentioning
confidence: 99%
See 1 more Smart Citation
“…In Threshold Based [8] IDS, audit data analysis of network information along with Threshold Analysis Module to adapt network behavior by varying the threshold to identify attacks, incurs some processing overhead.…”
Section: Processing Overheadmentioning
confidence: 99%
“…This affects the detection efficiency [12]. Increasing the node density inThreshold Based [8]slightly decreases the detection accuracy and increases average endto-end delay at the initial time.…”
Section: Traffic / Node Densitymentioning
confidence: 99%
“…The energy aspect, when considered, is either used to balance the workload in hierarchical IDSs [6], optimised offline in terms of power consumption of the IDS itself [7], or used as a feature to detect anomalous conditions from suspicious discharge behaviours [8]. With regard to adaptation, some approaches include techniques of tuning the detection thresholds to cope with the changes in the network [9] [10]. On-line energy-based adaptation is not covered in any of the reported approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection techniques are categorized into misuse detection and anomaly detection [17,18]. Misuse detection bases its idea on precedence, rules and misuse detectors that look for behavior which matches the already known attack scenario.…”
Section: Intrusion Detection Challengesmentioning
confidence: 99%
“…The Mobile Intrusion Detection System (MobIDS) [8,10,17] is similar to the other schemes described here. Multiple sensors in the ad-hoc network keep track of observed instances of the nodes' behavior.…”
Section: Related Workmentioning
confidence: 99%