A Study of Intrusion Detection Systems in MANETs
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
In past years, the use of mobile ad hoc networks (MANETs) has been widely spread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defence before an attacker can breach the system. In general, the intrusion detection techniques for traditional wireless networks are suitable for MANETs. In this paper, I classify the architectures for intrusion detection systems (IDS) that have been introduced for MANETs. Current IDS’s corresponding to those architectures are also reviewed and compared. I then provide some directions for future work.
Authors and Affiliations
Umesh Prasad Rout
A Dispersed Mobile Q&A Coordination Rooted In Set of Connections
Social internet searchers like Google, Bing answer truthful inquiries yet the late research endeavours have been centred around the social based question and answer (Q&A) framework which determines non-accurate quest...
Study of Median Filter in Different Noise Density Environments in Binary Images
Image processing is one of the most dominating and it is very important processing in communication environment. Efficient processing methods and filters are needed for efficient communication. In this paper I am goin...
Video Frame Retrieval Using Effective Query Processing
Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...
A New System to Filter Unwanted Content from OSN User Profiles
Security and integrity on the data posted by the user in their social network account is became a hot issues by the researchers. There is a little provision to control this as well as to prevent to post unwanted data...
Resource Provisioning Techniques in Cloud Computing Environment: A Survey
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...