A Survey on Intrusion in Ad Hoc Networks and its Detection Measures
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
Ad hoc wireless networks are defined as the category of wireless networks that utilizes multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure hence, they are called infrastructure less networks. The lack of any central coordination makes them more vulnerable to attacks than wired networks. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure therefore, detection should be added as another defense before an attacker can breach the system. Network intrusion detection is the process of monitoring the events occurring in the network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality. In this paper, we define and discuss various techniques of Intrusion Detection. We also present a description of routing protocols and types of security attacks possible in the network.
Authors and Affiliations
Ms. Preetee K. Karmore , Ms. Sonali T. Bodkhe
Byte Level NIDS Improvement
Byte sequences are used in multiple network intrusion detection systems (NIDS) as signatures to detect nasty activity. Though being highly competent, a high rate of false-positive rate is found. Here we suggest the conce...
Literature Review on Patient Scheduling Techniques
Patients need to undergo several checkups, tests, surgery and treatments according to their illness. This paper describes the challenges of patient scheduling and patient scheduling techniques. An efficient scheduling te...
Reclaiming Individuality of Mysterious Passage
Authorship attribution, the science of inferring characteristics of author from characteristics of documents written by that author become an urgent need to find the original author of anonymous text. In this paper, a no...
Visual Cryptographic Applications
Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secr...
Ontology-based Semantic Search Engine for Healthcare Services
With the development of Web Services, the retrieval of relevant services has become a challenge. The keyword-based discovery mechanism using UDDI and WSDL is insufficient due to the retrieval of a large amount of irrelev...