2012
DOI: 10.5539/cis.v5n4p132
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET

Abstract: In recent years, mobile ad hoc networks (MANET) have become an interesting research area. This type of networks have a salient characteristics compare with wired networks which are more vulnerable. Nowadays, for the network security, defend in depth strategies are used. One of them is intrusion detection system (IDS). Many intrusion detection techniques developed for weird networks however, because the nature of MANET we cannot apply them directly in MANET. According to detection techniques, IDSs can be classi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…The work in [15] comprehensively surveys the anomaly based intrusion detection techniques with advantages, and disadvantages. Further, it evaluates the performance of anomaly-based IDSs.…”
Section: Anomaly Based Ids Techniquesmentioning
confidence: 99%
“…The work in [15] comprehensively surveys the anomaly based intrusion detection techniques with advantages, and disadvantages. Further, it evaluates the performance of anomaly-based IDSs.…”
Section: Anomaly Based Ids Techniquesmentioning
confidence: 99%
“…The comparison can determine whether there is a partition between normal and unusual behaviors, and the unusual behavior is considered as an active or potential attack, which depends on the level of differences. Three common techniques supporting comparisons include statistical‐based , knowledge‐based, and machine learning‐based techniques .…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Statistical‐based technique tracks all networking traffics and generates a profile examining whether there are any improper traffic by a statistical analysis . The statistics are formulated by evaluating the correlations among the defined parameters, such as ports and devices, traffic rates, packets connecting to each protocol, and Internet Protocol addresses.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Another similar survey on anomaly-based intrusion detection techniques for MANET was undertaken by Kheyri and Karami [28], although the survey focused only on detection methods, rather than feature profiling and modelling (which is the focus of this paper). Patcha and Park [29] propose a generic IDS architectural design, as well as investigating existing detection techniques used in anomaly detection, but user profiling is not included in their survey.…”
Section: Introductionmentioning
confidence: 97%