Zone-based intrusion detection is a supporting protection mechanism for mobile adhoc environment consisting of large volume of distributed number of nodes. With the presence of malicious nodes, security will be violated, which is focused in proposed research by introducing Secured and Anonymous Zone-Based Intrusion Detection System (SAZIDS). Here, anonymous rule sharing is guaranteed by introducing the Anonymous Location-Aided Routing in MANET in which group signatures would be generated by all zone members based on group public key provided by the intra zone leader. Thus, the exact location of zone members cannot be revealed. To ensure the secured rule sharing, Enhanced Adaptive ACKnowledgment is utilized, which would ensure the presence of malicious nodes. This is done at the time of rule sharing by the intra zone leaders. After secured sharing of rule set, in order to optimize the memory storage, in this work, rule set aggregation is performed, which would merge the rules, thus resolving the bandwidth and associated memory issues. The overall evaluation of SAZIDS is performed in the NS2 simulation environment, which proves secured and reliable transmission of data without the involvement of malicious activities. KEYWORDS acknowledgement, Anonymization, data aggregation, memory overhead, zone based intrusion detection 1 INTRODUCTION Detecting intrusion in adhoc networks is harder compared to general systems. 1 In wired networks like LAN/WAN, a central infrastructure is available where network traffic flows are concentrated, 2 and an IDS (Intrusion Detection System) is introduced there. 3 In adhoc networks, there is no such a helpful point. A possibility for IDS establishment in adhoc networks would be a node that has generally vast number of neighboring nodessituated inside its corresponding range. 4 There ought to be various needs to cover every single participating nodes in the system, and these nodes need to speak with each other to pass on the neighborhood intrusion-related data. 5 Finding such nodes and enabling them to exchange information productively is not simple. 6 To exacerbate things, the nodes are mobile, and the system topology can change every now and again: it may rehash the hard procedure of setting up intrusion detection engineering over and over. 7A proficient strategy to recognize an attack when it happens in a MANET is the relationship of an Intrusion Detection System (IDS) with MANET. 8The IDS is a structure of combinatorial techniques for distinguishing any intelligent and unknown attacks in a secured MANET. 9 The framework does this activity of attack identification by analyzing every packet received in the environment and continuously monitoring the network traffic. 10 Deployment of Intrusion detection systems can be accomplished, either by running it in a controlled situation of multiple mobile nodes or by actuating it in a single mobile node. 11 In the last mentioned method, it will screen just its approaching activity on that specific node. These portable nodes can effectively educat...