Intrusion Detection Techniques In Mobile Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 5

Abstract

 The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no  open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and say that we must include intrusion detection in the security architecture for mobile computing environment. We have showed such architecture and evaluated key mechanisms in this architecture such as applying mobile agents to intrusion detection, anomaly detection and misuse detection for mobile ad-hoc networks

Authors and Affiliations

M . Senthilkumar

Keywords

Related Articles

 A Modular Approach To Intrusion Detection in Homogenous Wireless Network

 Wireless network is the latest and popular technology nowadays. Due to its ample advantage in various fields, it has always been the prime target for hackers and attackers to break through its security and the...

 Survey on Unsupervised Learning in Datamining

Data mining is a collection of techniques which is used to extract knowledge from huge amount of data. The first section contains the introduction and the next part describes the main task of data mining. Third part e...

 Relation between „3 Utility Problem‟ And „Eulerian Trail‟

 Abstract: There are two most renowned puzzles whose algorithms have been developed in the computer science (field- Algorithms and design Analysis) that are impossible to solve till date. They are 3 utility problem...

Image Denoising with Wavelet Based Thresholding

Abstract: Image processing is a field that continues to grow, with new applications being developed at an ever increasing pace. Image Denoising is an important part of image processing and computer vision problems. The...

 Increasing the Visibility of Search using Genetic Algorithm

Abstract : The vast repository of informational databases i.e. Web is available to the user in the form of textual documents. It’s a challenge to develop an effective information retrieval approach that can ease the user...

Download PDF file
  • EP ID EP125628
  • DOI -
  • Views 96
  • Downloads 0

How To Cite

M . Senthilkumar (2013).  Intrusion Detection Techniques In Mobile Networks. IOSR Journals (IOSR Journal of Computer Engineering), 10(5), 38-45. https://europub.co.uk/articles/-A-125628