2010 International Conference on Computer and Communication Technology (ICCCT) 2010
DOI: 10.1109/iccct.2010.5640420
|View full text |Cite
|
Sign up to set email alerts
|

A proposed model for Intrusion Detection System for mobile adhoc network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…According to reference [14], authors have been proposed a model to detect the intrusions using unfair use of transmission channel detection engine and anomaly detection engine by creating the trusted node list. Detection of transmission channel attacks are predefined, novel attacks for packet type forwarding using anomaly detection engine.…”
Section: Cooperative Intrusion Detectionmentioning
confidence: 99%
“…According to reference [14], authors have been proposed a model to detect the intrusions using unfair use of transmission channel detection engine and anomaly detection engine by creating the trusted node list. Detection of transmission channel attacks are predefined, novel attacks for packet type forwarding using anomaly detection engine.…”
Section: Cooperative Intrusion Detectionmentioning
confidence: 99%
“…MANET has widely used in military applications such as sharing information in battlefield, conferences, business meetings, emergency disaster relief after earthquake, hurricane, fire [4].Ubiquitous computing and pervasive computing are important era of current MANETs. Many authors have [5][6] [7] proposed solutions for securing single layer. But single layer features are not enough to find the attacks completely.…”
Section: Introductionmentioning
confidence: 99%
“…But single layer features are not enough to find the attacks completely. One can improve the detection ratio of attacks with the help of cross layer features [7] [8].…”
Section: Introductionmentioning
confidence: 99%
“…It is exceptionally urgent for the security of MANETs to have proactive barrier components that could recognize any abnormalities before they could upset system operations. Customary intrusion discovery frameworks are intended for wired systems and couldn't be straightforwardly connected to their remote reciprocals [34] [35]. The weaknesses of settled intrusion identification frameworks are clear since they require concentrated elements to control the operations of observing, location and revealing.…”
Section: Intrusion Detection System 2211 Overviewmentioning
confidence: 99%