๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Threshold-based intrusion detection in ad hoc networks and secure AODV

โœ Scribed by A. Patwardhan; J. Parker; M. Iorga; A. Joshi; T. Karygiannis; Y. Yesha


Publisher
Elsevier Science
Year
2008
Tongue
English
Weight
949 KB
Volume
6
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Collaborative techniques for intrusion d
โœ Ningrinla Marchang; Raja Datta ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 258 KB

In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea

Friend-assisted intrusion detection and
โœ S.A. Razak; S.M. Furnell; N.L. Clarke; P.J. Brooke ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 399 KB

Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in

A distributed intrusion detection system
โœ Adrian P. Lauf; Richard A. Peters; William H. Robinson ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 848 KB

This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds