In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
✍ Scribed by João B.D. Cabrera; Carlos Gutiérrez; Raman K. Mehra
- Book ID
- 108152861
- Publisher
- Elsevier Science
- Year
- 2008
- Tongue
- English
- Weight
- 666 KB
- Volume
- 9
- Category
- Article
- ISSN
- 1566-2535
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in
This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds