CFP last date
15 January 2025
Call for Paper
February Edition
IJAIS solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 15 January 2025

Submit your paper
Know more
Reseach Article

Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques

by Monika Darji, Bhushan Trivedi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 3
Year of Publication: 2012
Authors: Monika Darji, Bhushan Trivedi
10.5120/ijais12-450153

Monika Darji, Bhushan Trivedi . Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques. International Journal of Applied Information Systems. 1, 3 ( February 2012), 38-43. DOI=10.5120/ijais12-450153

@article{ 10.5120/ijais12-450153,
author = { Monika Darji, Bhushan Trivedi },
title = { Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2012 },
volume = { 1 },
number = { 3 },
month = { February },
year = { 2012 },
issn = { 2249-0868 },
pages = { 38-43 },
numpages = {9},
url = { https://www.ijais.org/archives/volume1/number3/77-0153/ },
doi = { 10.5120/ijais12-450153 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:41:00.194458+05:30
%A Monika Darji
%A Bhushan Trivedi
%T Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 1
%N 3
%P 38-43
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion Detection and Prevention System is a must for mobile ad networks as the security mechanisms like encryption, authentication and firewall systems are not able to completely secure the nodes and their communication. In this paper, we aim to study the various intrusion detection and prevention systems that were proposed for Mobile Adhoc Networks (MANETs) and compare the recent techniques Intrusion Detection based on their architecture and data gathering techniques.

References
  1. C.S.R.Murthy and B.S.Manoj, Ad Hoc Wireless Networks, Pearson Education, 2008.
  2. George Aggelou, Mobile Ad Hoc Networks, McGraw-Hill, 2004.
  3. E. Ahmed, K. Samad, W. Mahmood, “Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks,” AusCERT2006 R&D Stream Program, Information Technology Security Conference, May 2006.
  4. Zhou Chunyue, L.Y., (2006) “A Pattern Matching Based Network Intrusion Detection System”, IEEE, 9th International Conference on Control, Automation, Robotics and Vision 2006, 5-8 Dec, ICARCV '06, Singapore.
  5. Lu Huijuan, Chen Jianguo and Wei Wei, (2008) “Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System”, International Symposium on Electronic Commerce and Security, pp.482-487.
  6. Y. Zhang, W. Lee, ”Intrusion Detection in wireless ad -hoc networks”, Proc. of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM’2000), pp. 275-283, Aug 6-11.
  7. S. Buchegger, J.L. Boudec, “Performance analysis of the CONFIDANT protocol: cooperation of nodes- fairness in dynamic ad-hoc networks,” Proc. of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), June 2002, pp. 226-236.
  8. O. Kachirski, R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks”, Proc. of the 36th Hawaii International Conference on System Sciences (HICSS’03), IEEE, 2002.
  9. P. Albers, O. Camp, J-M. Percher, B. Jouga, M. Ludovic, and R.Puttini, “Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches”, Proc. of the First International Workshop on Wireless Information Systems (WIS-2002), April 2002, pp.1-12.
  10. D.Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R.Talpade,C.Ko, R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt, J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs”, In Proc. of the 3rd IEEE International Workshop on Information Assurance, pp. 57-70, 2005.
  11. B. Sun, K. Wu, U.W. Pooch. “Zone-based Intrusion Detection for Mobile Ad Hoc Networks. Ad Hoc and Sensor Wireless Networks”, zVol 2, No. 3, 2006.
  12. R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai,”Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks”,IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February,2010.
  13. Jaydip Sen, “An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks”, Second International Conference on Computational Intelligence, Communication Systems and Networks, 2010.
  14. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya “Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET”, IEEE Transactions on Dependable and Secure Computing, vol. 99, no. 1, 2008.
  15. Yinan Li , Zhihong Qian,” Mobile agents-based intrusion detection system for mobile ad hoc networks” 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection and Prevention System MANET Data gathering techniques