2010 3rd International Conference on Computer Science and Information Technology 2010
DOI: 10.1109/iccsit.2010.5563804
|View full text |Cite
|
Sign up to set email alerts
|

Efficient anomaly intrusion detection system in adhoc networks by mobile agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Esfandi proposed IDS using data mining technique that consists of two types of agents: home agent and mobile agent. The homes agent is installed at every node to collect and process the data of its own system, and detects the local anomalies using data mining technique.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Esfandi proposed IDS using data mining technique that consists of two types of agents: home agent and mobile agent. The homes agent is installed at every node to collect and process the data of its own system, and detects the local anomalies using data mining technique.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…Both the intrusive behavior and benign behavior of users, systems, or network change over time. The detection system should be self‐managed and self‐configured to handle the continuous changing dynamic environment and respond more quickly to dynamically changing hardware and software sources on the network. Localize the source of intruders: Few of the proposed schemes detect intruders but fail to localize the source of the intruders. So, the detection schemes should be able to cope up with a wider range of security attacks with comparable cost and also be able to localize the source of attacks. Hybrid detection approach: It is true from the theoretical aspect that combinations of multiple detection technologies as hybrid approach can produce more secure and reliable system.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…Imen Brahmi proposed in a distributed mobile agent based intrusion detection system, called MAD-IDS [1], The architecture of the MAD-IDS is based on detection of known and unknown attacks which uses the clustering and rule mining technique. Intelligent intrusion detection system framework using mobile agents [3] which detects the intruders based on the user profile and process profile. Research on distributed intrusion detection system based on mobile agent [6], which increases the system flexibility and security.…”
Section: Related Workmentioning
confidence: 99%
“…Attack (gray and blackhole) specific solution was also discussed in work of Ahmed and Hussain [22] and Sibichen & Sreedhar [23]. Various other security schemes has been also discussed by Malhotra et al, [24], Das et al, [25], Esfandi et al, [26] and Sumathy and Kumar [27]. There are also studies carried out reviewing the existing security approaches in adhoc network (Chandan and Mishra [28], Moudini et al, [29], Wu and Liaw [30]).…”
Section: Introductionmentioning
confidence: 98%