A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
In the last few years, we have seen the fast development of wireless communication technologies and a mobile ad hoc network play a major role for wireless communication. A MANET is a self-determining collection of mobile nodes that communicate over comparatively bandwidth constrained wireless mediums. Since the nodes are mobile, the network topology may change rapidly and impulsively over time. Many critical applications are using the mobile ad hoc network; therefore, security issue has become one of the major concerns in MANETs. Due to some unique features and characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can break the system. Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. An Intrusion Detection System is used to supervise networks for attacks or intrusions and report these intrusions to the administrator in order to take direct action. In this paper we have surveyed different types of intrusion detection techniques in MANETs and analyzed their effectiveness.
Authors and Affiliations
Shankar Sharan Tripathi, , Sonu Agrawal,
Optical Character Recognition Techniques: A survey
A survey on AODV routing protocol for AD-HOC Network
Now a day, Ad-hoc network has become an indivisible part for communication for mobile devices. There are different types of topology for implementation of Ad-hoc network. AODV is one of them which are a reactive protocol...
A Review on Ensemble of Diverse Artificial Neural Networks
Ensemble Data Mining Methods, also known as Committee Methods or Model Combiners, which provides the power of multiple classifiers to achieve better prediction accuracy than any of the individual classifier could on...
Implementing Software as a Service in Cloud using Android Applications
The software as a service is provided using android applications. The cloud client is authenticated to get software services from the cloud server. The services include running java applications without installing...
Public-Key Infrastructure (PKI
This paper presents a survey on Public-Key Infrastructure (PKI). This discussion is centered on overview of public-key infrastructure, its key elements, PKI management functions, protocols, digital certificate format...