Analytical Survey of Active Intrusion Detection Techniques in Mobile Ad Hoc Networks

نویسنده

  • P Sumathi
چکیده

The mobile ad hoc network (MANET) is an infrastructure less system, comprises of mobile devices connected by wireless medium. MANET data communication undergoes various violation and prohibition issues by its mobile nodes, due to different access and information flow requirement across the network. In addition intermittent connectivity of wireless network and mobile device failures cause security lapses in the MANET communication, further leads to intruder’s generating multiple attacks.. Intrusion detection gets more significant in current MANET security research works. Furthermore due the open forum of MANET may change the system topology by suspecting attacks like inactive eavesdropping, dynamic impersonation and denial of services. To avoid all the problems created by an intruder, a successful MANET is implemented based on its security. The security research in MANET has been paying attention on key managing, routing protocol and intrusion detection techniques. The rating on intrusion detection and supportive layer in MANET has provided with a resolution to extend it to the real world applications. The active intrusion detection system aims to revise the various intrusion detections and prevention systems predicted for Mobile Ad hoc Networks (MANETs) and also compare the latest techniques of Intrusion Detection dependent on their architecture and data gathering techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Intrusion Detection Techniques in Mobile Ad hoc Networks

Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of indepth protection for wired networks. However, relatively little r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014