Wireless networks that are decentralized and communicate without using existing infrastructure known as mobile ad-hoc networks. The most common sorts of threats attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system detect additional security issues. Monitoring essential avoid provide extra protection against unauthorized access. Although c...