2007
DOI: 10.1109/compsac.2007.18
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…These nodes collect intrusion alerts from other nodes and decide whether any node in the network is under attack. These nodes do not need other nodes' participation in decision making [2,3].…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…These nodes collect intrusion alerts from other nodes and decide whether any node in the network is under attack. These nodes do not need other nodes' participation in decision making [2,3].…”
Section: Preliminariesmentioning
confidence: 99%
“…A cluster head is responsible locally for its node as well as globally for its cluster, e.g. monitoring network packets and initiating a global response when network intrusion is detected [2,3,7].…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…But as a distributed cooperative IDS, it has the potential of excessive communication and computation between nodes, causing degradation in the network performance. 13 Mell and McLarnon proposed a hierarchical IDS architecture. 14 A cluster of neighboring MANET nodes randomly and fairly elect a monitoring node to run the IDS, and all the nodes in this cluster trust this cluster head node to perform the IDS function.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…Thus, even though the idea of integrated detection and response model seems feasible, it appears that the implementation and simulation have not been conducted. Similarly, few related IDA models propose response actions/frameworks for responding to the attacks once it is detected [57][58][59][60][61][62][63][64][65]. However the response system incorporating all those actions is not implemented.…”
Section: Review Of Manet Intrusion Response Securitymentioning
confidence: 99%