CFP last date
16 December 2024
Reseach Article

IDSs based on Stand-alone Architecture for MANET: A Survey

by Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 10
Year of Publication: 2012
Authors: Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi
10.5120/ijais12-450792

Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi . IDSs based on Stand-alone Architecture for MANET: A Survey. International Journal of Applied Information Systems. 4, 10 ( December 2012), 13-19. DOI=10.5120/ijais12-450792

@article{ 10.5120/ijais12-450792,
author = { Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi },
title = { IDSs based on Stand-alone Architecture for MANET: A Survey },
journal = { International Journal of Applied Information Systems },
issue_date = { December 2012 },
volume = { 4 },
number = { 10 },
month = { December },
year = { 2012 },
issn = { 2249-0868 },
pages = { 13-19 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number10/393-0792/ },
doi = { 10.5120/ijais12-450792 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:48:08.058686+05:30
%A Kapil Dhamecha
%A Rutvik Upadhyay
%A Bhushan Trivedi
%T IDSs based on Stand-alone Architecture for MANET: A Survey
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 10
%P 13-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDSs for MANETs have attracted much attention recently and thus, there are many publications that propose new IDS solutions or improvements to the existing. Current IDSs pose challenges on not only capricious intrusion categories, but also huge computational power. Though there are a number of existing literatures to IDS issues, an attempt is made to give a more elaborate image for a comprehensive review on IDSs based on stand-alone architecture for MANETs, because of the uniqueness to identify the attack solely. In addition, the table and the figure summarized in the content contribute to easily grasp the overall picture of stand-alone IDSs along with existing open issues.

References
  1. H. Miranda and L. Rodrigues, 'Preventing selfishness in open mobile ad hoc networks,' in Proc. Of the Seventh CaberNet Radicals Workshop, October 2002.
  2. D. Djenouri, L. Khelladi, N. Badache, "A Survey of Security Issues in Mobile Ad Hoc Networks," IEEE Communications Surveys, Vol. 7, No. 4, Fourth Quarter 2005.
  3. S. Sen and J. A. Clark, "Intrusion Detection in Mobile Ad Hoc Networks". In: Guide to Wireless Ad Hoc Networks, S. Misra, I. Woungang, S. C. Misra (Eds. ), Springer, 2009.
  4. T. Anantvalee, J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, Chapter 7, pp. 170 - 196, 2006.
  5. C. Xenakis, C. Panos, I. Stavrakaki,"A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks" Computers and Security , Elsevier, pp. 63-80,2011.
  6. Y. Jain, R. Ahirwar,"Secure Mobile Agent Based IDS for MANET", International Journal of Computer Science and Information Technologies, Vol. 3 (4), pp. 4798-4805, 2012.
  7. G. A. Jacoby, N. J. Davis, "Mobile Host-Based intrusion Detection and Attack Identification, "IEEE Wireless Communications, vol. 14, issue 4, pp. 53-60, August 2007.
  8. K. Nadkarni, A. Mishra, "A Novel Intrusion Detection Approach for Wireless Ad Hoc Networks," IEEE Wireless Communications and Networking Conference (WCNC. 2004), Vol. 2, pp. 831 – 836, March 2004.
  9. A. Lauf, R. A. Peters, W. H. Robinson, "A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks". Elsevier Journal of Ad Hoc Networks, vol. 8, issue 3, pp. 253-266, May 2010.
  10. S. Gavini," Detecting Packet dropping faults in Mobile Adhoc Networks", 2004.
  11. P. Kabiri, M. Again, "Feature Analysis for Intrusion Detection in Mobile Ad Hoc Networks",International Journal of Network Security, 12 (2), 80-87, 2011.
  12. J. Joseph, B. Lee, A. Das, & B. Seet, "Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA", Dependable and Secure Computing, IEEE Transactions, 8 (2), 233-245,2011.
  13. H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, & N. Kato," A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks", Vehicular Technology, IEEE Transactions on, 58(5), 2471-2481, 2009.
  14. S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad hoc Networks," Research Report cs. NI/0307012, Stanford University, 2003.
  15. S. Srivastava, N. Gupta, S. Chturvedi, S. Ghosh, "A Survey on Mobile Agent based Intrusion Detection System", ISDMISC, IJCA, 2011.
  16. D Kheyri1 & M Karami1,"A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET", Computer and Information Science; Vol. 5, No. 4; 2012.
  17. Y Huang, & L Wenke," A Cooperative Intrusion Detection System for Ad Hoc Networks", proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks2003.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Adhoc Network (MANET) Intrusion Detection System (IDS) stand-alone architecture